Redcannary

This commit is contained in:
frack113
2022-04-04 10:57:23 +02:00
parent dd7576e4b3
commit aaafef29b4
5 changed files with 136 additions and 0 deletions
@@ -0,0 +1,26 @@
title: Suspicious Get Current User
id: 4096a49c-7de4-4da0-a230-c66ccd56ea5a
status: experimental
description: Use the PowerShell to identify the current logged user.
date: 2022/04/04
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1033/T1033.md#atomic-test-4---user-discovery-with-env-vars-powershell-script
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1033/T1033.md#atomic-test-5---getcurrent-user-with-powershell-script
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains:
- '[System.Environment]::UserName'
- '$env:UserName'
- '[System.Security.Principal.WindowsIdentity]::GetCurrent()'
condition: selection
falsepositives:
- Legitimate PowerShell scripts
level: low
tags:
- attack.discovery
- attack.t1033