diff --git a/rules/windows/sysmon/sysmon_susp_vssadmin_ntds_activity.yml b/rules/windows/sysmon/sysmon_susp_vssadmin_ntds_activity.yml new file mode 100644 index 000000000..af48acc7a --- /dev/null +++ b/rules/windows/sysmon/sysmon_susp_vssadmin_ntds_activity.yml @@ -0,0 +1,22 @@ +title: Activity Related to NTDS.dit Domain Hash Retrieval +status: experimental +description: Detects suspicious commands that could be related to activity that uses volume shadow copy to steal and retrieve hashes from the NTDS.dit file remotely +author: Florian Roth +logsource: + product: windows + service: sysmon +detection: + selection: + EventID: 1 + CommandLine: + # Ransomware + - 'vssadmin.exe Delete Shadows' + # Hacking + - 'vssadmin create shadow /for=C:' + - 'copy \\?\GLOBALROOT\Device\*\windows\ntds\ntds.dit' + - 'vssadmin delete shadows /for=C:' + - 'reg SAVE HKLM\SYSTEM ' + condition: selection +falsepositives: + - Administrative activity +level: high