Detectionmediumtest
Suspicious Access to Sensitive File Extensions
Detects known sensitive file extensions accessed on a network share
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 5145
RelativeTargetName|endswith:
- '.bak'
- '.dmp'
- '.edb'
- '.kirbi'
- '.msg'
- '.nsf'
- '.nst'
- '.oab'
- '.ost'
- '.pst'
- '.rdp'
# - '\groups.xml' # Commented out: groups.xml is accessed legitimately by Group Policy processing; high FP rate in enterprise environments
condition: selectionFalse Positives
Help Desk operator doing backup or re-imaging end user machine or backup software
Users working with these data types or exchanging message files
References
1
Resolving title…
Internal ResearchMITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
91c945bc-2ad1-4799-a591-4d00198a1215
Status
test
Level
medium
Type
Detection
Created
Wed Apr 03
Modified
Fri Oct 17
Author
Path
rules/windows/builtin/security/win_security_susp_raccess_sensitive_fext.yml
Raw Tags
attack.collectionattack.t1039