Emerging Threatmediumtest

Suspicious Set Value of MSDT in Registry (CVE-2022-30190)

Detects set value ms-msdt MSProtocol URI scheme in Registry that could be an attempt to exploit CVE-2022-30190.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Sittikorn SCreated Sun May 31Updated Thu Aug 172d9403d5-7927-46b7-8216-37ab7c9ec5e32022
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetObject|startswith: 'HKCR\ms-msdt\'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

MITRE ATT&CK

Other

attack.t1221detection.emerging-threats
Rule Metadata
Rule ID
2d9403d5-7927-46b7-8216-37ab7c9ec5e3
Status
test
Level
medium
Type
Emerging Threat
Created
Sun May 31
Modified
Thu Aug 17
Path
rules-emerging-threats/2022/Exploits/CVE-2022-30190/registry_set_exploit_cve_2022_30190_msdt_follina.yml
Raw Tags
attack.defense-evasionattack.t1221detection.emerging-threats
View on GitHub