SigmaHQ/rules/windows/powershell/powershell_suspicious_mounted_share_deletion.yml
2021-08-21 09:50:59 +02:00

26 lines
899 B
YAML

title: PowerShell Deleted Mounted Share
id: 66a4d409-451b-4151-94f4-a55d559c49b0
status: experimental
description: Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.005/T1070.005.md
author: 'oscd.community, @redcanary, Zach Stanford @svch0st'
date: 2020/10/08
tags:
- attack.defense_evasion
- attack.t1070.005
logsource:
product: windows
service: powershell
definition: Script block logging must be enabled
detection:
selection:
EventID: 4104
ScriptBlockText|contains:
- 'Remove-SmbShare'
- 'Remove-FileShare'
condition: selection
falsepositives:
- Administrators or Power users may remove their shares via cmd line
level: medium