rule: suspicious process creation as SYSTEM user

This commit is contained in:
Florian Roth
2021-12-07 07:34:18 +01:00
parent 48b1ef02df
commit 507a0649f3
@@ -0,0 +1,61 @@
title: Suspicious SYSTEM User Process Creation
id: 2617e7ed-adb7-40ba-b0f3-8f9945fe6c09
status: experimental
description: Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)
references:
- Internal Research
author: Florian Roth
date: 2021/12/07
logsource:
category: process_creation
product: windows
detection:
selection:
IntegrityLevel: System
User|contains|all: # covers many language settings
- 'AUT'
- 'SYSTEM'
selection_special:
- Image|endswith:
- '\calc.exe'
- '\wscript.exe'
- '\cscript.exe'
- '\schtasks.exe'
- '\hh.exe'
- '\mshta.exe'
- '\forfiles.exe'
- '\ping.exe'
- CommandLine|contains:
- 'sc stop ' # stops a system service
- ' -NoP ' # Often used in malicious PowerShell commands
- ' -W Hidden ' # Often used in malicious PowerShell commands
- ' -decode ' # Used with certutil
- ' /decode ' # Used with certutil
- ' /urlcache ' # Used with certutil
- ' -urlcache ' # Used with certutil
- ' -e* JAB' # PowerShell encoded commands
- ' -e* SUVYI' # PowerShell encoded commands
- ' -e* SQBFAFgA' # PowerShell encoded commands
- ' -e* aWV4I' # PowerShell encoded commands
- ' -e* IAB' # PowerShell encoded commands
- ' -e* PAA' # PowerShell encoded commands
- ' -e* aQBlAHgA' # PowerShell encoded commands
- 'vssadmin delete shadows' # Ransomware
- 'reg SAVE HKLM' # save registry SAM - syskey extraction
- ' -ma ' # ProcDump
- 'Microsoft\Windows\CurrentVersion\Run' # Run key in command line - often in combination with REG ADD
- '.downloadstring(' # PowerShell download command
- '.downloadfile(' # PowerShell download command
- ' /ticket:' # Rubeus
- ' sekurlsa' # Mimikatz
- ' p::d ' # Mimikatz
- ';iex(' # PowerShell IEX
- 'schtasks* /create' # Scheduled task creation
- 'MiniDump' # Process dumping method apart from procdump
- 'net user '
condition: all of selection*
falsepositives:
- Administrative activity
- Scripts and administrative tools used in the monitored environment
- Monitoring activity
level: high