Files
blue-team-tools/rules-unsupported/windows/image_load_mimikatz_inmemory_detection.yml
T
Nasreddine Bencherchali 23a9f98eae chore: move more rules
2023-04-21 15:00:36 +02:00

43 lines
1.1 KiB
YAML

title: Mimikatz In-Memory
id: c0478ead-5336-46c2-bd5e-b4c84bc3a36e
status: unsupported
description: Detects certain DLL loads when Mimikatz gets executed
references:
- https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/
author: sigma
date: 2017/03/13
modified: 2023/02/24
tags:
- attack.s0002
- attack.t1003
- attack.lateral_movement
- attack.credential_access
- car.2019-04-004
logsource:
category: image_load
product: windows
detection:
selector:
Image: 'C:\Windows\System32\rundll32.exe'
dllload1:
ImageLoaded|endswith: '\vaultcli.dll'
dllload2:
ImageLoaded|endswith: '\wlanapi.dll'
exclusion:
ImageLoaded:
- 'ntdsapi.dll'
- 'netapi32.dll'
- 'imm32.dll'
- 'samlib.dll'
- 'combase.dll'
- 'srvcli.dll'
- 'shcore.dll'
- 'ntasn1.dll'
- 'cryptdll.dll'
- 'logoncli.dll'
timeframe: 30s
condition: selector | near dllload1 and dllload2 and not exclusion
falsepositives:
- Unknown
level: medium