SigmaHQ/rules/windows/sysmon/sysmon_mimikatz_inmemory_detection.yml

33 lines
934 B
YAML
Raw Normal View History

2017-02-10 18:17:02 +00:00
title: Mimikatz In-Memory Detection
status: experimental
description: Detects certain DLL loads when Mimikatz gets executed
reference: https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/
logsource:
product: windows
service: sysmon
2017-02-10 18:17:02 +00:00
detection:
selector:
EventID: 7
Image: 'C:\Windows\System32\rundll32.exe'
dllload1:
ImageLoaded: '*\vaultcli.dll'
2017-02-10 18:17:02 +00:00
dllload2:
ImageLoaded: '*\wlanapi.dll'
2017-02-10 18:17:02 +00:00
exclusion:
ImageLoaded:
2017-02-10 18:17:02 +00:00
- 'ntdsapi.dll'
- 'netapi32.dll'
- 'imm32.dll'
- 'samlib.dll'
- 'combase.dll'
- 'srvcli.dll'
- 'shcore.dll'
- 'ntasn1.dll'
- 'cryptdll.dll'
- 'logoncli.dll'
timeframe: last 30s
condition: selector | near dllload1 and dllload2 and not exclusion within timeframe
2017-02-10 18:17:02 +00:00
falsepositives:
- unknown
level: medium