Detectionmediumtest

PUA - Mouse Lock Execution

In Kaspersky's 2020 Incident Response Analyst Report they listed legitimate tool "Mouse Lock" as being used for both credential access and collection in security incidents.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Cian HeasleyCreated Thu Aug 13Updated Tue Feb 21c9192ad9-75e5-43eb-8647-82a0a5b493e3windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        - Product|contains: 'Mouse Lock'
        - Company|contains: 'Misc314'
        - CommandLine|contains: 'Mouse Lock_'
    condition: selection
False Positives

Legitimate uses of Mouse Lock software

Rule Metadata
Rule ID
c9192ad9-75e5-43eb-8647-82a0a5b493e3
Status
test
Level
medium
Type
Detection
Created
Thu Aug 13
Modified
Tue Feb 21
Path
rules/windows/process_creation/proc_creation_win_pua_mouselock_execution.yml
Raw Tags
attack.credential-accessattack.collectionattack.t1056.002
View on GitHub