← Back to Explore
sigmalowHunting
Unattend.XML File Access Attempt
Detects attempts to access the "unattend.xml" file, where credentials might be stored. This file is used during the unattended windows install process.
Detection Query
selection:
FileName|endswith: \Panther\unattend.xml
condition: selection
Author
frack113
Created
2024-07-22
Data Sources
windowsfile_access
Platforms
windows
Tags
attack.credential-accessattack.t1552.001detection.threat-hunting
Raw Content
title: Unattend.XML File Access Attempt
id: 76a26006-0942-430b-8249-bd51d448f8e5
status: test
description: |
Detects attempts to access the "unattend.xml" file, where credentials might be stored.
This file is used during the unattended windows install process.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
author: frack113
date: 2024-07-22
tags:
- attack.credential-access
- attack.t1552.001
- detection.threat-hunting
logsource:
product: windows
category: file_access
definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'
detection:
selection:
FileName|endswith: '\Panther\unattend.xml'
condition: selection
falsepositives:
- Unknown
level: low