Rule: Vssadmin / NTDS.dit activity

This commit is contained in:
Florian Roth
2017-03-17 00:23:55 +01:00
parent d00bbd9fb5
commit c6843d41bc
@@ -0,0 +1,22 @@
title: Activity Related to NTDS.dit Domain Hash Retrieval
status: experimental
description: Detects suspicious commands that could be related to activity that uses volume shadow copy to steal and retrieve hashes from the NTDS.dit file remotely
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
CommandLine:
# Ransomware
- 'vssadmin.exe Delete Shadows'
# Hacking
- 'vssadmin create shadow /for=C:'
- 'copy \\?\GLOBALROOT\Device\*\windows\ntds\ntds.dit'
- 'vssadmin delete shadows /for=C:'
- 'reg SAVE HKLM\SYSTEM '
condition: selection
falsepositives:
- Administrative activity
level: high