Detectionmediumtest

Suspicious Application Installed

Detects suspicious application installed by looking at the added shortcut to the app resolver cache

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems)Created Sun Aug 1483c161b6-ca67-4f33-8ad0-644a0737cf07windows
Log Source
Windowsshell-core
ProductWindows← raw: windows
Serviceshell-core← raw: shell-core
Detection Logic
Detection Logic2 selectors
detection:
    selection_name:
        EventID: 28115
        Name|contains:
            # Please add more
            - 'Zenmap'
            - 'AnyDesk'
            - 'wireshark'
            - 'openvpn'
    selection_packageid:
        EventID: 28115
        AppID|contains:
            # Please add more
            - 'zenmap.exe'
            - 'prokzult ad' # AnyDesk
            - 'wireshark'
            - 'openvpn'
    condition: 1 of selection_*
False Positives

Packages or applications being legitimately used by users or administrators

MITRE ATT&CK
Rule Metadata
Rule ID
83c161b6-ca67-4f33-8ad0-644a0737cf07
Status
test
Level
medium
Type
Detection
Created
Sun Aug 14
Path
rules/windows/builtin/shell_core/win_shell_core_susp_packages_installed.yml
Raw Tags
attack.execution
View on GitHub