Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Adding CAR-2021-12-002-T1547.001 Detection of modification of registry key "Common Startup" located in "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\" and "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\". When user logon, files in the Startup Folder are launched. Attacker may modify these forlders with other to evade detection set on these default folders. Detection focus at the same time on the EventID 4688 with the process creation and EventID 4657 for the modification of Registry Key. * Update CAR-2021-12-002.yaml Sysmon EventID 1 added * Fixed coverage & unit_tests * Minor update to description * Removed source and event_log from splunk query * Added EID 13 sysmon detection to Splunk query * Added pseudocode + tweaked implementations Co-authored-by: luffy68 <[email protected]> Co-authored-by: Ivan Kirillov <[email protected]>
- Loading branch information