SigmaHQ/rules/windows/builtin/win_alert_mimikatz_keywords.yml

27 lines
748 B
YAML
Raw Normal View History

title: Mimikatz Usage
description: This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)
author: Florian Roth
logsource:
2017-02-19 10:08:23 +00:00
product: windows
2016-12-27 13:49:54 +00:00
detection:
selection:
EventLog:
- Security
- System
- Application
- Microsoft-Windows-Sysmon/Operational
2016-12-27 13:49:54 +00:00
keywords:
- mimikatz
- mimilib
- <3 eo.oe
- eo.oe.kiwi
- privilege::debug
- sekurlsa::logonpasswords
- lsadump::sam
2017-02-10 18:17:02 +00:00
- mimidrv.sys
condition: selection and 1 of keywords
2016-12-27 13:49:54 +00:00
falsepositives:
- Naughty administrators
- Penetration test
2017-02-16 17:02:26 +00:00
level: critical