Skip to content

Instantly share code, notes, and snippets.

@Cyb3rWard0g
Created June 7, 2020 19:27
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Cyb3rWard0g/2e6ce7148ff979d248e6cf7e27ee4e6c to your computer and use it in GitHub Desktop.
Save Cyb3rWard0g/2e6ce7148ff979d248e6cf7e27ee4e6c to your computer and use it in GitHub Desktop.
title: Processes Accessing the microphone and webcam
id: 29976992-e6d6-4fce-8f9d-e7b9be4efbb6
status: experimental
description: Potential adversaries accessing the microphone and webcam in an endpoint.
references:
- https://twitter.com/duzvik/status/1269671601852813320
- https://medium.com/@7a616368/can-you-track-processes-accessing-the-camera-and-microphone-7e6885b37072
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/06/07
tags:
- attack.defense_evasion
- attack.t1112
logsource:
product: windows
service: security
detection:
selection1:
EventID: 4657
selection2:
ObjectName|contains: '\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone'
selection3:
ObjectName|contains: '\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam'
condition: selection1 and (select2 or selection3)
falsepositives:
- Maybe zoom, MS teams.
level: critical
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment