Potential Suspicious Activity Using SeCEdit
Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
Sigma rule (View on GitHub)
1title: Potential Suspicious Activity Using SeCEdit
2id: c2c76b77-32be-4d1f-82c9-7e544bdfe0eb
3status: test
4description: Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
5references:
6 - https://blueteamops.medium.com/secedit-and-i-know-it-595056dee53d
7 - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/secedit
8author: Janantha Marasinghe
9date: 2022-11-18
10modified: 2022-12-30
11tags:
12 - attack.collection
13 - attack.discovery
14 - attack.persistence
15 - attack.defense-evasion
16 - attack.credential-access
17 - attack.privilege-escalation
18 - attack.t1562.002
19 - attack.t1547.001
20 - attack.t1505.005
21 - attack.t1556.002
22 - attack.t1562
23 - attack.t1574.007
24 - attack.t1564.002
25 - attack.t1546.008
26 - attack.t1546.007
27 - attack.t1547.014
28 - attack.t1547.010
29 - attack.t1547.002
30 - attack.t1557
31 - attack.t1082
32logsource:
33 category: process_creation
34 product: windows
35detection:
36 selection_img:
37 - Image|endswith: '\secedit.exe'
38 - OriginalFileName: 'SeCEdit'
39 selection_flags_discovery:
40 CommandLine|contains|all:
41 - '/export'
42 - '/cfg'
43 selection_flags_configure:
44 CommandLine|contains|all:
45 - '/configure'
46 - '/db'
47 # filter:
48 # SubjectUserName|endswith: '$' SubjectUserName is from event ID 4719 in the Windows Security log
49 condition: selection_img and (1 of selection_flags_*)
50falsepositives:
51 - Legitimate administrative use
52level: medium
References
Related rules
- Cisco BGP Authentication Failures
- Cisco LDP Authentication Failures
- Huawei BGP Authentication Failures
- Juniper BGP Missing MD5
- PUA - System Informer Execution