2019-12-28 02:25:53 +00:00
title : Trickbot Malware Recon Activity
id : 410ad193-a728-4107-bc79-4419789fcbf8
status : experimental
description : Trickbot enumerates domain/network topology and executes certain commands automatically every few minutes. This detectors attempts to identify that activity based off a command rarely observed in an enterprise network.
references :
- https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/
author : David Burkett
2020-04-02 07:53:09 +00:00
date : 2019 /12/28
2019-12-28 14:55:39 +00:00
tags :
- attack.t1482
2019-12-28 02:25:53 +00:00
logsource :
category : process_creation
product : windows
detection :
2019-12-28 14:55:39 +00:00
selection :
2019-12-28 02:25:53 +00:00
Image :
- '*\nltest.exe'
CommandLine :
- '/domain_trusts /all_trusts'
- '/domain_trusts'
2019-12-28 14:55:39 +00:00
condition : selection
2019-12-28 02:25:53 +00:00
fields :
- CommandLine
2019-12-28 14:55:39 +00:00
- ParentCommandLine
2019-12-28 02:25:53 +00:00
falsepositives :
2019-12-28 15:28:08 +00:00
- Rare System Admin Activity
2019-12-28 02:25:53 +00:00
level : critical