Detectionmediumtest
ISO or Image Mount Indicator in Recent Files
Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event
Events for file system activity including creation, modification, and deletion.
Detection Logic
Detection Logic1 selector
detection:
selection:
TargetFilename|endswith:
- '.iso.lnk'
- '.img.lnk'
- '.vhd.lnk'
- '.vhdx.lnk'
TargetFilename|contains: '\Microsoft\Windows\Recent\'
condition: selectionFalse Positives
Cases in which a user mounts an image file for legitimate reasons
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
4358e5a5-7542-4dcb-b9f3-87667371839b
Status
test
Level
medium
Type
Detection
Created
Fri Feb 11
Path
rules/windows/file/file_event/file_event_win_iso_file_recent.yml
Raw Tags
attack.initial-accessattack.t1566.001