Data Copied To Clipboard Via Clip.EXE
Detects the execution of clip.exe in order to copy data to the clipboard. Adversaries may collect data stored in the clipboard from users copying information within or between applications.
Sigma rule (View on GitHub)
1title: Data Copied To Clipboard Via Clip.EXE
2id: ddeff553-5233-4ae9-bbab-d64d2bd634be
3status: test
4description: Detects the execution of clip.exe in order to copy data to the clipboard. Adversaries may collect data stored in the clipboard from users copying information within or between applications.
5references:
6 - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/clip
7 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1115/T1115.md
8author: frack113
9date: 2021-07-27
10modified: 2023-02-21
11tags:
12 - attack.collection
13 - attack.t1115
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 - Image|endswith: '\clip.exe'
20 - OriginalFileName: clip.exe
21 condition: selection
22falsepositives:
23 - Unknown
24level: low
References
Related rules
- Clipboard Collection of Image Data with Xclip Tool
- Clipboard Collection with Xclip Tool
- Clipboard Collection with Xclip Tool - Auditd
- Clipboard Data Collection Via OSAScript
- PowerShell Get Clipboard