heroui logo

Suspicious Digital Signature Of AppX Package

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the execution of AppX packages that are signed with known suspicious or malicious digital signatures. Specifically, it monitors for EventID 157 associated with a specific subject name linked to 'Foresee Consulting Inc.', which has a history of being flagged in security contexts. When this particular AppX package executes, it raises an alert, indicating a potential malicious activity or an evasion tactic being employed by an attacker. The rule utilizes Windows logging capabilities specific to the AppX packaging service and is designed to reduce false positives by focusing on a predetermined subject name known to be associated with threats.
Categories
  • Windows
  • Cloud
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
Created: 2023-01-16