Detection rules › Sigma

PUA - Sysinternal Tool Execution - Registry

Severity
low
Author
Markus Neis
Source
upstream

Detects the execution of a Sysinternals Tool via the creation of the "accepteula" registry key

MITRE ATT&CK coverage

TacticTechniques
Resource DevelopmentT1588.002 Obtain Capabilities: Tool

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: selection

TargetObject|endswith: '\EulaAccepted'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetObjectends_with
  • \EulaAccepted corpus 4 (sigma 4)

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.