MITRE Technique T1546.008
Read about this MITRE Technique at -
The following is a Splunk query for logs from Sysmon to detect this technique being used on Windows -
Last updated
Read about this MITRE Technique at -
The following is a Splunk query for logs from Sysmon to detect this technique being used on Windows -
Last updated
index=sysmon (EventCode=13 TargetObject IN (*osk.exe*, *sethc.exe*, *utilman.exe*, *magnify.exe*, *narrator.exe*, *DisplaySwitch.exe*, *atbroker.exe*)) OR (TargetFilename IN (*osk.exe*, *sethc.exe*) EventCode=11)
| eval TargetFile=coalesce(TargetObject, TargetFilename)
| mvexpand User
| search NOT User="NOT_TRANSLATED"
| table TargetFile UtcTime Sid ProcessGuid ProcessId User ComputerName