Merge pull request #1041 from ryanplasma/rplas-SIGMA-547-page-13

[OSCD] Add Stored Credentials in Fake Files rule
This commit is contained in:
yugoslavskiy
2021-01-05 22:57:36 +03:00
committed by GitHub
@@ -0,0 +1,29 @@
title: Stored Credentials in Fake Files
id: 692b979c-f747-41dc-ad72-1f11c01b110e
description: Search for accessing of fake files with stored credentials
status: experimental
author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
date: 2020/10/05
references:
- https://image.slidesharecdn.com/kheirkhabarovoffzonefinal-181117201458/95/hunting-for-privilege-escalation-in-windows-environment-13-638.jpg
tags:
- attack.credential_access
- attack.t1555
logsource:
product: windows
service: security
detection:
selection:
EventID: 4663
AccessList|contains: '%%4416'
ObjectName|endswith:
- '\%POLICY_ID%\Machine\Preferences\Groups\Groups.xml'
- '\%FOLDER_NAME%\Unattend.xml'
condition: selection
fields:
- EventID
- AccessList
- ObjectName
falsepositives:
- Unknown
level: high