SigmaHQ/rules/windows/process_creation/win_apt_turla_commands.yml

46 lines
1.1 KiB
YAML
Raw Normal View History

2017-11-07 23:33:17 +00:00
action: global
2019-11-12 22:12:27 +00:00
title: Turla Group Lateral Movement
id: c601f20d-570a-4cde-a7d6-e17f99cb8e7f
2017-11-07 23:33:17 +00:00
status: experimental
2019-11-12 22:12:27 +00:00
description: Detects automated lateral movement by Turla group
references:
- https://securelist.com/the-epic-turla-operation/65545/
2018-07-25 07:50:01 +00:00
tags:
- attack.g0010
2019-03-13 10:06:34 +00:00
- attack.execution
- attack.t1059
- attack.lateral_movement
- attack.t1077 # an old one
- attack.t1021.002
2019-03-13 10:06:34 +00:00
- attack.discovery
- attack.t1083
- attack.t1135
2017-11-07 23:33:17 +00:00
author: Markus Neis
date: 2017/11/07
modified: 2020/08/27
2017-11-07 23:33:17 +00:00
logsource:
category: process_creation
product: windows
2017-11-07 23:33:17 +00:00
falsepositives:
- Unknown
---
detection:
selection:
CommandLine:
2017-11-07 23:33:17 +00:00
- 'net use \\%DomainController%\C$ "P@ssw0rd" *'
2019-02-02 23:24:57 +00:00
- 'dir c:\\*.doc* /s'
- 'dir %TEMP%\\*.exe'
2017-11-07 23:33:17 +00:00
condition: selection
level: critical
---
detection:
netCommand1:
CommandLine: 'net view /DOMAIN'
netCommand2:
CommandLine: 'net session'
netCommand3:
CommandLine: 'net share'
timeframe: 1m
condition: netCommand1 | near netCommand2 and netCommand3
2017-11-07 23:33:17 +00:00
level: medium