SigmaHQ/rules/windows/sysmon/sysmon_quarkspw_filedump.yml

25 lines
617 B
YAML
Raw Normal View History

2018-02-10 14:25:36 +00:00
title: QuarksPwDump Dump File
2019-11-12 22:12:27 +00:00
id: 847def9e-924d-4e90-b7c4-5f581395a2b4
2018-02-10 14:25:36 +00:00
status: experimental
description: Detects a dump file written by QuarksPwDump password dumper
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm
author: Florian Roth
date: 2018/02/10
tags:
- attack.credential_access
- attack.t1003
2018-02-10 14:25:36 +00:00
level: critical
logsource:
product: windows
service: sysmon
detection:
selection:
# Sysmon: File Creation (ID 11)
EventID: 11
TargetFilename: '*\AppData\Local\Temp\SAM-*.dmp*'
2018-02-10 14:25:36 +00:00
condition: selection
falsepositives:
- Unknown