Sysprep on AppData Folder

Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec)

Sigma rule (View on GitHub)

 1title: Sysprep on AppData Folder
 2id: d5b9ae7a-e6fc-405e-80ff-2ff9dcc64e7e
 3status: test
 4description: Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec)
 5references:
 6    - https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets
 7    - https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b
 8author: Florian Roth (Nextron Systems)
 9date: 2018/06/22
10modified: 2021/11/27
11tags:
12    - attack.execution
13    - attack.t1059
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        Image|endswith: '\sysprep.exe'
20        CommandLine|contains: '\AppData\'
21    condition: selection
22falsepositives:
23    - False positives depend on scripts and administrative tools used in the monitored environment
24level: medium

References

Related rules

to-top