[New Rule] NTDS or SAM Database File Copied (#622)
* [New Rule] NTDS or SAM Database File Copied * fixed description * eql syntax * Update rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com> * ecs_version Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
This commit is contained in:
@@ -0,0 +1,44 @@
|
||||
[metadata]
|
||||
creation_date = "2020/11/24"
|
||||
maturity = "production"
|
||||
updated_date = "2020/11/24"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies a copy operation of the Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files.
|
||||
Those files contain sensitive information including hashed domain and/or local credentials.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = ["winlogbeat-*", "logs-endpoint.events.*"]
|
||||
language = "eql"
|
||||
license = "Elastic License"
|
||||
max_signals = 33
|
||||
name = "NTDS or SAM Database File Copied"
|
||||
references = ["https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/"]
|
||||
risk_score = 73
|
||||
rule_id = "3bc6deaa-fbd4-433a-ae21-3e892f95624f"
|
||||
severity = "high"
|
||||
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Credential Access"]
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where event.type in ("start", "process_started") and
|
||||
process.pe.original_file_name in ("Cmd.Exe", "PowerShell.EXE", "XCOPY.EXE") and
|
||||
process.args : ("copy", "xcopy", "Copy-Item", "move", "cp", "mv") and
|
||||
process.args : ("*\\ntds.dit", "*\\config\\SAM", "\\*\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy*\\*")
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1003"
|
||||
name = "OS Credential Dumping"
|
||||
reference = "https://attack.mitre.org/techniques/T1003/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0006"
|
||||
name = "Credential Access"
|
||||
reference = "https://attack.mitre.org/tactics/TA0006/"
|
||||
Reference in New Issue
Block a user