SigmaHQ/rules/windows/sysmon/sysmon_mimikatz_inmemory_detection.yml
2020-06-16 14:46:08 -06:00

46 lines
1.2 KiB
YAML

title: Mimikatz In-Memory
id: c0478ead-5336-46c2-bd5e-b4c84bc3a36e
status: experimental
description: Detects certain DLL loads when Mimikatz gets executed
references:
- https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/
tags:
- attack.s0002
- attack.t1003
- attack.lateral_movement
- attack.credential_access
- car.2019-04-004
- attack.t1003.002
- attack.t1003.004
- attack.t1003.001
- attack.t1003.006
logsource:
product: windows
service: sysmon
date: 2017/03/13
detection:
selector:
EventID: 7
Image: 'C:\Windows\System32\rundll32.exe'
dllload1:
ImageLoaded: '*\vaultcli.dll'
dllload2:
ImageLoaded: '*\wlanapi.dll'
exclusion:
ImageLoaded:
- 'ntdsapi.dll'
- 'netapi32.dll'
- 'imm32.dll'
- 'samlib.dll'
- 'combase.dll'
- 'srvcli.dll'
- 'shcore.dll'
- 'ntasn1.dll'
- 'cryptdll.dll'
- 'logoncli.dll'
timeframe: 30s
condition: selector | near dllload1 and dllload2 and not exclusion
falsepositives:
- unknown
level: medium