2017-01-10 21:40:59 +00:00
title : Mimikatz Usage
description : This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)
2017-02-18 23:31:59 +00:00
author : Florian Roth
logsource :
2017-02-19 10:08:23 +00:00
product : windows
2016-12-27 13:49:54 +00:00
detection :
selection :
2017-02-15 22:53:08 +00:00
EventLog :
- Security
- System
- Application
- Microsoft-Windows-Sysmon/Operational
2016-12-27 13:49:54 +00:00
keywords :
- mimikatz
- mimilib
- <3 eo.oe
- eo.oe.kiwi
- privilege::debug
- sekurlsa::logonpasswords
- lsadump::sam
2017-02-10 18:17:02 +00:00
- mimidrv.sys
2017-01-10 14:05:19 +00:00
condition : selection and 1 of keywords
2016-12-27 13:49:54 +00:00
falsepositives :
- Naughty administrators
2017-02-24 22:44:42 +00:00
- Penetration test
2017-02-16 17:02:26 +00:00
level : critical