SigmaHQ/rules/windows/builtin/win_susp_rottenpotato.yml

28 lines
799 B
YAML
Raw Normal View History

2019-11-15 10:44:18 +00:00
title: RottenPotato Like Attack Pattern
id: 16f5d8ca-44bd-47c8-acbe-6fc95a16c12f
status: experimental
description: Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like
references:
- https://twitter.com/SBousseaden/status/1195284233729777665
author: "@SBousseaden, Florian Roth"
date: 2019/11/15
tags:
- attack.privilege_escalation
- attack.credential_access
- attack.t1171 # an old one
2020-06-16 20:46:08 +00:00
- attack.t1557.001
2019-11-15 10:44:18 +00:00
logsource:
product: windows
service: security
detection:
selection:
2019-11-15 10:44:18 +00:00
EventID: 4624
LogonType: 3
TargetUserName: 'ANONYMOUS_LOGON'
WorkstationName: '-'
SourceNetworkAddress: '127.0.0.1'
condition: selection
falsepositives:
- Unknown
level: high