Detection rules › Sigma

ClickOnce Trust Prompt Tampering

Severity
medium
Author
@SerkinValery, Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects changes to the ClickOnce trust prompt registry key in order to enable an installation from different locations such as the Internet.

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1112 Modify Registry
Defense EvasionT1112 Modify Registry

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: selection

or:
TargetObject|endswith: '\Internet'
TargetObject|endswith: '\LocalIntranet'
TargetObject|endswith: '\MyComputer'
TargetObject|endswith: '\TrustedSites'
TargetObject|endswith: '\UntrustedSites'
Details: Enabled
TargetObject|contains: '\SOFTWARE\MICROSOFT\.NETFramework\Security\TrustManager\PromptingLevel\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Detailseq
  • Enabled
TargetObjectends_with
  • \Internet
  • \LocalIntranet
  • \MyComputer
  • \TrustedSites
  • \UntrustedSites
TargetObjectmatch
  • \SOFTWARE\MICROSOFT\.NETFramework\Security\TrustManager\PromptingLevel\