SigmaHQ/rules/windows/sysmon/sysmon_mimikatz_inmemory_detection.yml

39 lines
1014 B
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: Mimikatz In-Memory
2017-02-10 18:17:02 +00:00
status: experimental
description: Detects certain DLL loads when Mimikatz gets executed
references:
- https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/
tags:
- attack.s0002
2019-03-06 04:25:12 +00:00
- attack.t1003
- attack.lateral_movement
- attack.credential_access
logsource:
product: windows
service: sysmon
2017-02-10 18:17:02 +00:00
detection:
selector:
EventID: 7
Image: 'C:\Windows\System32\rundll32.exe'
dllload1:
ImageLoaded: '*\vaultcli.dll'
2017-02-10 18:17:02 +00:00
dllload2:
ImageLoaded: '*\wlanapi.dll'
2017-02-10 18:17:02 +00:00
exclusion:
ImageLoaded:
2017-02-10 18:17:02 +00:00
- 'ntdsapi.dll'
- 'netapi32.dll'
- 'imm32.dll'
- 'samlib.dll'
- 'combase.dll'
- 'srvcli.dll'
- 'shcore.dll'
- 'ntasn1.dll'
- 'cryptdll.dll'
- 'logoncli.dll'
2017-08-04 22:32:24 +00:00
timeframe: 30s
condition: selector | near dllload1 and dllload2 and not exclusion
2017-02-10 18:17:02 +00:00
falsepositives:
- unknown
level: medium