Files
blue-team-tools/rules/windows/registry_event/sysmon_dns_serverlevelplugindll.yml
T
2021-09-02 21:16:55 +02:00

47 lines
1.2 KiB
YAML
Executable File

action: global
title: DNS ServerLevelPluginDll Install
status: experimental
description: Detects the installation of a plugin DLL via ServerLevelPluginDll parameter in Registry, which can be used to execute code in context of the DNS server
(restart required)
references:
- https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
date: 2017/05/08
modified: 2020/09/06
author: Florian Roth
tags:
- attack.defense_evasion
- attack.t1073 # an old one
- attack.t1574.002
- attack.t1112
fields:
- EventID
- CommandLine
- ParentCommandLine
- Image
- User
- TargetObject
falsepositives:
- unknown
level: high
---
id: e61e8a88-59a9-451c-874e-70fcc9740d67
logsource:
product: windows
category: registry_event
detection:
dnsregmod:
TargetObject|endswith: '\services\DNS\Parameters\ServerLevelPluginDll'
condition: 1 of them
---
id: f63b56ee-3f79-4b8a-97fb-5c48007e8573
logsource:
category: process_creation
product: windows
detection:
dnsadmin:
Image|endswith: '\dnscmd.exe'
CommandLine|contains|all:
- '/config'
- '/serverlevelplugindll'
condition: 1 of them