SigmaHQ/wazuh/rules/sigma_win_impacket_secretdump.yml
joker2013 50379800f2 123
2020-12-03 01:43:30 +03:00

16 lines
376 B
YAML

alert:
- debug
description: Detect AD credential dumping using impacket secretdump HKTL
filter:
- query:
query_string:
query: (data.win.system.eventID:"5145" AND share_name.keyword:\\*\\ADMIN$ AND share_relative_target_name.keyword:SYSTEM32\\*.tmp)
index: wazuh-alerts-3.x-*
name: 252902e3-5830-4cf6-bf21-c22083dfd5cf_0
priority: 2
realert:
minutes: 0
type: any