Potential Suspicious Activity Using SeCEdit
Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
Sigma rule (View on GitHub)
1title: Potential Suspicious Activity Using SeCEdit
2id: c2c76b77-32be-4d1f-82c9-7e544bdfe0eb
3status: test
4description: Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
5references:
6 - https://blueteamops.medium.com/secedit-and-i-know-it-595056dee53d
7 - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/secedit
8author: Janantha Marasinghe
9date: 2022-11-18
10modified: 2022-12-30
11tags:
12 - attack.discovery
13 - attack.persistence
14 - attack.defense-evasion
15 - attack.credential-access
16 - attack.privilege-escalation
17 - attack.t1562.002
18 - attack.t1547.001
19 - attack.t1505.005
20 - attack.t1556.002
21 - attack.t1562
22 - attack.t1574.007
23 - attack.t1564.002
24 - attack.t1546.008
25 - attack.t1546.007
26 - attack.t1547.014
27 - attack.t1547.010
28 - attack.t1547.002
29 - attack.t1557
30 - attack.t1082
31logsource:
32 category: process_creation
33 product: windows
34detection:
35 selection_img:
36 - Image|endswith: '\secedit.exe'
37 - OriginalFileName: 'SeCEdit'
38 selection_flags_discovery:
39 CommandLine|contains|all:
40 - '/export'
41 - '/cfg'
42 selection_flags_configure:
43 CommandLine|contains|all:
44 - '/configure'
45 - '/db'
46 # filter:
47 # SubjectUserName|endswith: '$' SubjectUserName is from event ID 4719 in the Windows Security log
48 condition: selection_img and (1 of selection_flags_*)
49falsepositives:
50 - Legitimate administrative use
51level: medium
References
Related rules
- Cisco BGP Authentication Failures
- Cisco LDP Authentication Failures
- Huawei BGP Authentication Failures
- Juniper BGP Missing MD5
- Github Self Hosted Runner Changes Detected