heroui logo

Arbitrary Shell Command Execution Via Settingcontent-Ms

Sigma Rules

View Source
Summary
The rule titled 'Arbitrary Shell Command Execution Via Settingcontent-Ms' is designed to detect potentially malicious execution of shell commands via .SettingContent-ms files on Windows 10 systems. These files, introduced in Windows 10, serve as shortcuts to access various system setting pages and are composed in XML format. Attackers may exploit these files to execute unauthorized shell commands by including nefarious command lines that contain embedded references to .SettingContent-ms files. The detection rule specifically monitors process creation events for any instances where the command line of a process includes '.SettingContent-ms', but excludes instances where 'immersivecontrolpanel' commands are also present, creating a focused detection of unusual activity. The rule is categorized under the Windows product and is applicable in the context of process creation. It utilizes keywords such as 'attack.t1204', 'attack.t1566.001', among others, to represent the nature of the attack and its execution pathway. False positives are acknowledged as 'unknown', indicating potential legitimate use that may require further investigation. The continued monitoring of process creation pertaining to this file type is essential for identifying and mitigating risks posed by arbitrary shell command execution in Windows environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2020-03-13