[metadata] creation_date = "2023/08/25" integration = ["endpoint"] maturity = "production" min_stack_comments = "New fields added: required_fields, related_integrations, setup" min_stack_version = "8.3.0" updated_date = "2023/08/25" bypass_bbr_timing = true [rule] author = ["Elastic"] description = """ Identifies unusual process executions using MSSQL Service accounts, which can indicate the exploitation/compromise of SQL instances. Attackers may exploit exposed MSSQL instances for initial access or lateral movement. """ from = "now-9m" index = ["logs-endpoint.events.*"] language = "eql" license = "Elastic License v2" name = "Unusual Process For MSSQL Service Accounts" references = [ "https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/", "https://learn.microsoft.com/en-us/sql/database-engine/configure-windows/configure-windows-service-accounts-and-permissions?view=sql-server-ver16" ] risk_score = 21 rule_id = "e74d645b-fec6-431e-bf93-ca64a538e0de" severity = "low" tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Initial Access", "Data Source: Elastic Defend", "Rule Type: BBR"] timestamp_override = "event.ingested" type = "eql" building_block_type = "default" query = ''' process where event.type == "start" and host.os.type == "windows" and user.name : ( "SQLSERVERAGENT", "SQLAGENT$*", "MSSQLSERVER", "MSSQL$*", "MSSQLServerOLAPService", "ReportServer*", "MsDtsServer150", "MSSQLFDLauncher*", "SQLServer2005SQLBrowserUser$*", "SQLWriter", "winmgmt" ) and user.domain : "NT SERVICE" and not ( process.name : ( "sqlceip.exe", "sqlservr.exe", "sqlagent.exe", "msmdsrv.exe", "ReportingServicesService.exe", "MsDtsSrvr.exe", "sqlbrowser.exe" ) and (process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true) ) ''' [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1190" name = "Exploit Public-Facing Application" reference = "https://attack.mitre.org/techniques/T1190/" [rule.threat.tactic] id = "TA0001" name = "Initial Access" reference = "https://attack.mitre.org/tactics/TA0001/" [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1505" name = "Server Software Component" reference = "https://attack.mitre.org/techniques/T1505/" [rule.threat.tactic] id = "TA0003" name = "Persistence" reference = "https://attack.mitre.org/tactics/TA0003/"