Windows Terminal Profile Settings Modification By Uncommon Process
Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.
Sigma rule (View on GitHub)
1title: Windows Terminal Profile Settings Modification By Uncommon Process
2id: 9b64de98-9db3-4033-bd7a-f51430105f00
3status: test
4description: Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/74438b0237d141ee9c99747976447dc884cb1a39/atomics/T1547.015/T1547.015.md#atomic-test-1---persistence-by-modifying-windows-terminal-profile
7 - https://twitter.com/nas_bench/status/1550836225652686848
8author: frack113, Nasreddine Bencherchali (Nextron Systems)
9date: 2023-07-22
10tags:
11 - attack.persistence
12 - attack.t1547.015
13logsource:
14 product: windows
15 category: file_event
16detection:
17 selection:
18 Image|endswith:
19 # Note: Add other potential common applications
20 - '\cmd.exe'
21 - '\cscript.exe'
22 - '\mshta.exe'
23 - '\powershell.exe'
24 - '\pwsh.exe'
25 - '\wscript.exe'
26 TargetFilename|endswith: '\AppData\Local\Packages\Microsoft.WindowsTerminal_8wekyb3d8bbwe\LocalState\settings.json'
27 condition: selection
28falsepositives:
29 - Some false positives may occur with admin scripts that set WT settings.
30level: medium
References
Related rules
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group
- A New Trust Was Created To A Domain
- A Security-Enabled Global Group Was Deleted
- AWS ECS Task Definition That Queries The Credential Endpoint