Merge pull request #1041 from ryanplasma/rplas-SIGMA-547-page-13
[OSCD] Add Stored Credentials in Fake Files rule
This commit is contained in:
@@ -0,0 +1,29 @@
|
||||
title: Stored Credentials in Fake Files
|
||||
id: 692b979c-f747-41dc-ad72-1f11c01b110e
|
||||
description: Search for accessing of fake files with stored credentials
|
||||
status: experimental
|
||||
author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
|
||||
date: 2020/10/05
|
||||
references:
|
||||
- https://image.slidesharecdn.com/kheirkhabarovoffzonefinal-181117201458/95/hunting-for-privilege-escalation-in-windows-environment-13-638.jpg
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1555
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4663
|
||||
AccessList|contains: '%%4416'
|
||||
ObjectName|endswith:
|
||||
- '\%POLICY_ID%\Machine\Preferences\Groups\Groups.xml'
|
||||
- '\%FOLDER_NAME%\Unattend.xml'
|
||||
condition: selection
|
||||
fields:
|
||||
- EventID
|
||||
- AccessList
|
||||
- ObjectName
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
Reference in New Issue
Block a user