2019-12-30 13:25:43 +00:00
|
|
|
title: Copy from Admin Share
|
|
|
|
id: 855bc8b5-2ae8-402e-a9ed-b889e6df1900
|
|
|
|
status: experimental
|
2020-10-16 00:01:23 +00:00
|
|
|
description: Detects a suspicious copy command to or from an Admin share
|
2020-06-16 20:46:08 +00:00
|
|
|
references:
|
|
|
|
- https://twitter.com/SBousseaden/status/1211636381086339073
|
2020-10-16 00:01:23 +00:00
|
|
|
- https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view
|
|
|
|
author: 'Florian Roth, oscd.community, Teymur Kheirkhabarov @HeirhabarovT, Zach Stanford @svch0st'
|
2019-12-30 13:25:43 +00:00
|
|
|
date: 2019/12/30
|
2020-11-28 11:44:54 +00:00
|
|
|
modified: 2020/11/28
|
2019-12-30 13:25:43 +00:00
|
|
|
tags:
|
|
|
|
- attack.lateral_movement
|
2020-10-16 00:01:23 +00:00
|
|
|
- attack.collection
|
|
|
|
- attack.exfiltration
|
|
|
|
- attack.t1039
|
|
|
|
- attack.t1105 # an old one
|
|
|
|
- attack.t1048
|
2020-08-03 15:43:14 +00:00
|
|
|
- attack.t1021.002
|
2019-12-30 13:25:43 +00:00
|
|
|
logsource:
|
|
|
|
category: process_creation
|
|
|
|
product: windows
|
|
|
|
detection:
|
2020-10-16 00:01:23 +00:00
|
|
|
selection1:
|
|
|
|
Image|endswith:
|
|
|
|
- '\robocopy.exe'
|
|
|
|
- '\xcopy.exe'
|
|
|
|
selection2:
|
2020-11-28 11:44:54 +00:00
|
|
|
Image|endswith: '\cmd.exe'
|
|
|
|
CommandLine|contains: 'copy'
|
2020-10-16 00:01:23 +00:00
|
|
|
selection3:
|
2020-11-28 11:44:54 +00:00
|
|
|
Image|contains: '\powershell'
|
2020-10-15 22:22:49 +00:00
|
|
|
CommandLine|contains:
|
2020-10-16 00:01:23 +00:00
|
|
|
- 'copy-item'
|
|
|
|
- 'copy'
|
|
|
|
- 'cpi '
|
|
|
|
- ' cp '
|
|
|
|
selection4:
|
2020-11-28 11:44:54 +00:00
|
|
|
CommandLine|contains|all:
|
|
|
|
- '\\\\'
|
|
|
|
- '$'
|
2020-10-16 00:01:23 +00:00
|
|
|
condition: (selection1 or selection2 or selection3) and selection4
|
2019-12-30 13:25:43 +00:00
|
|
|
fields:
|
|
|
|
- CommandLine
|
|
|
|
- ParentCommandLine
|
|
|
|
falsepositives:
|
|
|
|
- Administrative scripts
|
|
|
|
level: high
|