Delete sysmon_сreds_dump.yml

merged with rules/windows/sysmon/sysmon_cred_dump_lsass_access.yml
This commit is contained in:
yugoslavskiy 2019-11-08 02:06:20 +03:00 committed by GitHub
parent 562e07de38
commit 6d61401b12
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,26 +0,0 @@
title: Cred access
description: The following GrantedAccess only privileged levels of memory access to specific processes. This will typically be very low volume, with Sysmon events only being logged in the event of attacker activity. Most characteristic of powershell offensive tools.
references:
- https://azure.microsoft.com/en-ca/blog/detecting-in-memory-attacks-with-sysmon-and-azure-security-center
tags:
- attack.credential_access
- attack.t1003
status: experimental
author: Aleksey Potapov, oscd.community
date: 2019/10/23
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 10
TargetImage: 'C:\windows\system32\lsass.exe'
GrantedAccess:
- '0x1f0fff'
- '0x1f1fff'
- '0x1f2fff'
- '0x1f3fff'
condition: selection
falsepositives:
- unknown
level: high