Detection rules › Sigma

Narrator's Feedback-Hub Persistence

Severity
high
Author
Dmitriy Lifanov, oscd.community
Source
upstream

Detects abusing Windows 10 Narrator's Feedback-Hub

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege EscalationT1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Event coverage

ProviderEvent IDTitle
Sysmon12RegistryEvent (Object create and delete)
Sysmon13RegistryEvent (Value Set)
Sysmon14RegistryEvent (Key and Value Rename)

Stages and Predicates

Stage 1: 1 of selection1

EventType: DeleteValue
TargetObject|endswith: '\AppXypsaf9f1qserqevf0sws76dx4k9a5206\Shell\open\command\DelegateExecute'

Stage 2: 1 of selection2

TargetObject|endswith: '\AppXypsaf9f1qserqevf0sws76dx4k9a5206\Shell\open\command\(Default)'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventTypeeq
  • DeleteValue corpus 5 (sigma 4, splunk 1)
TargetObjectends_with
  • \AppXypsaf9f1qserqevf0sws76dx4k9a5206\Shell\open\command\(Default)
  • \AppXypsaf9f1qserqevf0sws76dx4k9a5206\Shell\open\command\DelegateExecute