Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_findstr_lsass.yml
T
Nasreddine Bencherchali 2883c2e714 fix: test errors
2023-03-07 14:23:44 +01:00

33 lines
1013 B
YAML

title: Findstr LSASS
id: fe63010f-8823-4864-a96b-a7b4a0f7b929
status: experimental
description: Detects findstring commands that include the keyword lsass, which indicates recon actviity for the LSASS process PID
references:
- https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html?m=1
author: Florian Roth (Nextron Systems)
date: 2022/08/12
tags:
- attack.credential_access
- attack.t1552.006
logsource:
category: process_creation
product: windows
detection:
selection_findstr_img:
- Image|endswith: '\findstr.exe'
- OriginalFileName: 'FINDSTR.EXE'
selection_findstr_cli:
CommandLine|contains: 'lsass'
selection_special:
CommandLine|contains:
- ' /i lsass.exe'
- ' /i "lsass'
- 'findstr lsass'
- 'findstr.exe lsass'
- 'findstr "lsass'
- 'findstr.exe "lsass'
condition: all of selection_findstr_* or selection_special
falsepositives:
- Unknown
level: high