Enable WDigest using PowerShell

Rule to detect registry modifications to enable WDigest using powershell over the commandline.

Sigma rule (View on GitHub)

 1title: Enable WDigest using PowerShell
 2id: bda01c73-45bc-4997-8c63-f993ec08e87e
 3status: experimental
 4description: Rule to detect registry modifications to enable WDigest using powershell over the commandline.
 5author: The DFIR Report
 6references:
 7    - https://thedfirreport.com/2022/06/06/will-the-real-msiexec-please-stand-up-exploit-leads-to-data-exfiltration/
 8date: 2022/06/06
 9tags:
10    - attack.defense_evasion
11    - attack.t1112
12logsource:
13    category: process_creation
14    product: windows
15detection:
16    selection:
17        Image|endswith: '\powershell.exe'
18        CommandLine|contains|all:
19            - 'Set-ItemProperty'
20            - 'WDigest'
21            - 'UseLogonCredential'
22            - 'Value'
23            - '1'
24    condition: selection
25falsepositives:
26    - Admin activity
27level: medium

References

Related rules

to-top