SigmaHQ/rules/windows/builtin/win_mal_creddumper.yml

35 lines
772 B
YAML
Raw Normal View History

2019-03-06 04:25:12 +00:00
---
action: global
title: Malicious Service Install
description: This method detects well-known keywords of malicious services in the Windows System Eventlog
author: Florian Roth
2018-07-24 05:50:32 +00:00
tags:
- attack.credential_access
- attack.t1003
- attack.s0005
logsource:
product: windows
service: system
detection:
2019-03-11 15:58:57 +00:00
selection1:
EventID:
- 7045
keywords:
- 'WCE SERVICE'
- 'WCESERVICE'
- 'DumpSvc'
quarkspwdump:
EventID: 16
HiveName: '*\AppData\Local\Temp\SAM*.dmp'
2019-03-11 15:58:57 +00:00
condition: ( selection1 and keywords ) or ( selection2 and keywords ) or quarkspwdump
falsepositives:
- Unlikely
level: high
2019-03-06 04:25:12 +00:00
---
logsource:
product: windows
service: security
detection:
2019-03-11 15:58:57 +00:00
selection2:
2019-03-06 04:25:12 +00:00
EventID: 4697