mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 02:08:54 +00:00
rule added: Windows Kernel and 3rd-party drivers exploits. Token stealing
This commit is contained in:
parent
a0c9f1594e
commit
10db09c596
@ -0,0 +1,25 @@
|
||||
title: Windows Kernel and 3rd-party drivers exploits. Token stealing
|
||||
description: Detection of child processes spawned with SYSTEM privileges by parents with non-SYSTEM privileges and Medium integrity level
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1068
|
||||
status: experimental
|
||||
author: Teymur Kheirkhabarov (source), Daniil Yugoslavskiy (rule)
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
ParentIntegrityLevel: Medium
|
||||
IntegrityLevel: System
|
||||
User: "NT AUTHORITY\\SYSTEM"
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
enrichment:
|
||||
- EN_0001_cache_sysmon_event_id_1_info # http://bit.ly/314zc6x
|
||||
- EN_0002_enrich_sysmon_event_id_1_with_parent_info # http://bit.ly/2KmSC0l
|
Loading…
Reference in New Issue
Block a user