From d7acbb369ed8f37f9b6728d28d8848dad3619ab4 Mon Sep 17 00:00:00 2001 From: svch0stz <8684257+svch0stz@users.noreply.github.com> Date: Wed, 7 Oct 2020 17:22:09 +1100 Subject: [PATCH] Created powershell_suspicious_mounted_share_deletion.yml --- ...hell_suspicious_mounted_share_deletion.yml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 rules/windows/powershell/powershell_suspicious_mounted_share_deletion.yml diff --git a/rules/windows/powershell/powershell_suspicious_mounted_share_deletion.yml b/rules/windows/powershell/powershell_suspicious_mounted_share_deletion.yml new file mode 100644 index 00000000..aa341c16 --- /dev/null +++ b/rules/windows/powershell/powershell_suspicious_mounted_share_deletion.yml @@ -0,0 +1,24 @@ +title: Mounted Share was Deleted using PowerShell +id: 66a4d409-451b-4151-94f4-a55d559c49b0 +status: experimental +description: Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation +references: + - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.005/T1070.005.md +author: 'oscd.community, @redcanary, Zach Stanford @svch0st' +date: 2020/10/08 +tags: + - attack.defense_evasion + - attack.t1070.005 +logsource: + product: windows + service: powershell +detection: + selection: + EventID: 4104 + ScriptBlockText|contains: + - 'Remove-SmbShare' + - 'Remove-FileShare' + condition: selection +falsepositives: + - Administrators or Power users may remove their shares via cmd line +level: medium \ No newline at end of file