Detectionmediumtest

PUA - Sysinternals Tools Execution - Registry

Detects the execution of some potentially unwanted tools such as PsExec, Procdump, etc. (part of the Sysinternals suite) via the creation of the "accepteula" registry key.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems)Created Wed Aug 24Updated Sun Oct 26c7da8edc-49ae-45a2-9e61-9fd860e4e73dwindows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetObject|contains:
            - '\Active Directory Explorer'
            - '\Handle'
            - '\LiveKd'
            - '\Process Explorer'
            - '\ProcDump'
            - '\PsExec'
            - '\PsLoglist'
            - '\PsPasswd'
            - '\SDelete'
            - '\Sysinternals' # Global level https://twitter.com/leonzandman/status/1561736801953382400
        TargetObject|endswith: '\EulaAccepted'
    condition: selection
False Positives

Legitimate use of SysInternals tools. Filter the legitimate paths used in your environment

Testing & Validation

Regression Tests

by SigmaHQ Team
Positive Detection Test1 matchevtx

Microsoft-Windows-Sysmon

MITRE ATT&CK
Rule Metadata
Rule ID
c7da8edc-49ae-45a2-9e61-9fd860e4e73d
Status
test
Level
medium
Type
Detection
Created
Wed Aug 24
Modified
Sun Oct 26
Path
rules/windows/registry/registry_set/registry_set_pua_sysinternals_susp_execution_via_eula.yml
Raw Tags
attack.resource-developmentattack.t1588.002
View on GitHub