mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 02:08:54 +00:00
Delete sysmon_сreds_dump.yml
merged with rules/windows/sysmon/sysmon_cred_dump_lsass_access.yml
This commit is contained in:
parent
562e07de38
commit
6d61401b12
@ -1,26 +0,0 @@
|
||||
title: Cred access
|
||||
description: The following GrantedAccess only privileged levels of memory access to specific processes. This will typically be very low volume, with Sysmon events only being logged in the event of attacker activity. Most characteristic of powershell offensive tools.
|
||||
references:
|
||||
- https://azure.microsoft.com/en-ca/blog/detecting-in-memory-attacks-with-sysmon-and-azure-security-center
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
status: experimental
|
||||
author: Aleksey Potapov, oscd.community
|
||||
date: 2019/10/23
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 10
|
||||
TargetImage: 'C:\windows\system32\lsass.exe'
|
||||
GrantedAccess:
|
||||
- '0x1f0fff'
|
||||
- '0x1f1fff'
|
||||
- '0x1f2fff'
|
||||
- '0x1f3fff'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
Loading…
Reference in New Issue
Block a user