heroui logo

Suspicious Mount-DiskImage

Sigma Rules

View Source
Summary
The 'Suspicious Mount-DiskImage' detection rule aims to identify potentially malicious activity related to the mounting of disk images, specifically formats like .iso and .vhd, that adversaries may exploit to deliver payloads without triggering Windows' Mark of the Web (MOTW) warnings. The rule monitors PowerShell scripts where the command 'Mount-DiskImage' is used, particularly focusing on the presence of the '-ImagePath' parameter in the command text, making this more likely to indicate an intentional act to mount a possibly tainted image. Ensuring Script Block Logging is enabled is a prerequisite for this detection to function, as it allows for the logging of PowerShell scripts and enhances the visibility of operations performed by scripts that could be malicious. The rule falls under the low severity category and acknowledges that legitimate uses of PowerShell may generate false positives.
Categories
  • Windows
  • Cloud
  • Endpoint
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1553.005
Created: 2022-02-01