Diamond Sleet APT Scheduled Task Creation

Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

Sigma rule (View on GitHub)

 1title: Diamond Sleet APT Scheduled Task Creation
 2id: 3b8e5084-4de9-449a-a40d-0e11014f2e2d
 3status: experimental
 4description: |
 5        Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability
 6references:
 7    - https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/
 8author: Nasreddine Bencherchali (Nextron Systems)
 9date: 2023/10/24
10tags:
11    - attack.execution
12    - attack.privilege_escalation
13    - attack.persistence
14    - attack.t1053.005
15    - detection.emerging_threats
16logsource:
17    product: windows
18    service: security
19    definition: 'The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to allow this detection. We also recommend extracting the Command field from the embedded XML in the event data.'
20detection:
21    selection:
22        EventID: 4698
23        TaskName: '\Windows TeamCity Settings User Interface'
24        TaskContent|contains: 'uTYNkfKxHiZrx3KJ'
25    condition: selection
26falsepositives:
27    - Unknown
28level: critical

References

Related rules

to-top