Detectionmediumtest

ISO or Image Mount Indicator in Recent Files

Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Florian Roth (Nextron Systems)Created Fri Feb 114358e5a5-7542-4dcb-b9f3-87667371839bwindows
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event

Events for file system activity including creation, modification, and deletion.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetFilename|endswith:
            - '.iso.lnk'
            - '.img.lnk'
            - '.vhd.lnk'
            - '.vhdx.lnk'
        TargetFilename|contains: '\Microsoft\Windows\Recent\'
    condition: selection
False Positives

Cases in which a user mounts an image file for legitimate reasons

Rule Metadata
Rule ID
4358e5a5-7542-4dcb-b9f3-87667371839b
Status
test
Level
medium
Type
Detection
Created
Fri Feb 11
Path
rules/windows/file/file_event/file_event_win_iso_file_recent.yml
Raw Tags
attack.initial-accessattack.t1566.001
View on GitHub