SigmaHQ/rules/windows/process_creation/win_susp_process_creations.yml
Thomas Patzke f118839664 Further fixes and deduplications
From suggestions of @yugoslavskiy in issue #554.
2020-02-16 14:03:07 +01:00

75 lines
2.9 KiB
YAML

title: Suspicious Process Creation
id: 5f0f47a5-cb16-4dbe-9e31-e8d976d73de3
description: Detects suspicious process starts on Windows systems based on keywords
status: experimental
references:
- https://www.swordshield.com/2015/07/getting-hashes-from-ntds-dit-file/
- https://www.youtube.com/watch?v=H3t_kHQG1Js&feature=youtu.be&t=15m35s
- https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
- https://twitter.com/subTee/status/872244674609676288
- https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/remote-tool-examples
- https://tyranidslair.blogspot.ca/2017/07/dg-on-windows-10-s-executing-arbitrary.html
- https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/
- https://subt0x10.blogspot.ca/2017/04/bypassing-application-whitelisting.html
- https://gist.github.com/subTee/7937a8ef07409715f15b84781e180c46#file-rat-bat
- https://twitter.com/vector_sec/status/896049052642533376
- http://security-research.dyndns.org/pub/slides/FIRST-TC-2018/FIRST-TC-2018_Tom-Ueltschi_Sysmon_PUBLIC.pdf
author: Florian Roth, Daniil Yugoslavskiy, oscd.community (update)
date: 2018/01/01
modified: 2019/11/01
tags:
- car.2013-07-001
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine:
- '* sekurlsa:*'
- net localgroup administrators * /add
- net group "Domain Admins" * /ADD /DOMAIN
- certutil.exe *-urlcache* http*
- certutil.exe *-urlcache* ftp*
- netsh advfirewall firewall *\AppData\\*
- attrib +S +H +R *\AppData\\*
- schtasks* /create *\AppData\\*
- schtasks* /sc minute*
- '*\Regasm.exe *\AppData\\*'
- '*\Regasm *\AppData\\*'
- '*\bitsadmin* /transfer*'
- '*\certutil.exe * -decode *'
- '*\certutil.exe * -decodehex *'
- '*\certutil.exe -ping *'
- icacls * /grant Everyone:F /T /C /Q
- '* wbadmin.exe delete catalog -quiet*'
- '*\wscript.exe *.jse'
- '*\wscript.exe *.js'
- '*\wscript.exe *.vba'
- '*\wscript.exe *.vbe'
- '*\cscript.exe *.jse'
- '*\cscript.exe *.js'
- '*\cscript.exe *.vba'
- '*\cscript.exe *.vbe'
- '*\fodhelper.exe'
- '*waitfor*/s*'
- '*waitfor*/si persist*'
- '*remote*/s*'
- '*remote*/c*'
- '*remote*/q*'
- '*AddInProcess*'
- '* /stext *'
- '* /scomma *'
- '* /stab *'
- '* /stabular *'
- '* /shtml *'
- '* /sverhtml *'
- '* /sxml *'
condition: selection
fields:
- ComputerName
- User
- CommandLine
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: medium