Detectionmediumtest
Suspicious Application Installed
Detects suspicious application installed by looking at the added shortcut to the app resolver cache
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems)Created Sun Aug 1483c161b6-ca67-4f33-8ad0-644a0737cf07windows
Log Source
Windowsshell-core
ProductWindows← raw: windows
Serviceshell-core← raw: shell-core
Detection Logic
Detection Logic2 selectors
detection:
selection_name:
EventID: 28115
Name|contains:
# Please add more
- 'Zenmap'
- 'AnyDesk'
- 'wireshark'
- 'openvpn'
selection_packageid:
EventID: 28115
AppID|contains:
# Please add more
- 'zenmap.exe'
- 'prokzult ad' # AnyDesk
- 'wireshark'
- 'openvpn'
condition: 1 of selection_*False Positives
Packages or applications being legitimately used by users or administrators
References
MITRE ATT&CK
Tactics
Rule Metadata
Rule ID
83c161b6-ca67-4f33-8ad0-644a0737cf07
Status
test
Level
medium
Type
Detection
Created
Sun Aug 14
Path
rules/windows/builtin/shell_core/win_shell_core_susp_packages_installed.yml
Raw Tags
attack.execution