mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
d2592ee0b6
Signed-off-by: Gábor Lipták <gliptak@gmail.com>
35 lines
1.3 KiB
YAML
35 lines
1.3 KiB
YAML
title: Detection of Possible Rotten Potato
|
|
id: 6c5808ee-85a2-4e56-8137-72e5876a5096
|
|
description: Detection of child processes spawned with SYSTEM privileges by parents with LOCAL SERVICE or NETWORK SERVICE privileges
|
|
references:
|
|
- https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
|
- https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/
|
|
tags:
|
|
- attack.privilege_escalation
|
|
- attack.t1134 # an old one
|
|
- attack.t1134.002
|
|
status: experimental
|
|
author: Teymur Kheirkhabarov
|
|
date: 2019/10/26
|
|
modified: 2020/09/01
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
definition: Works only if Enrich Sysmon events with additional information about process in ParentUser check enrichment section
|
|
detection:
|
|
selection:
|
|
ParentUser:
|
|
- 'NT AUTHORITY\NETWORK SERVICE'
|
|
- 'NT AUTHORITY\LOCAL SERVICE'
|
|
User: 'NT AUTHORITY\SYSTEM'
|
|
rundllexception:
|
|
Image|endswith: '\rundll32.exe'
|
|
CommandLine|contains: 'DavSetCookie'
|
|
condition: selection and not rundllexception
|
|
falsepositives:
|
|
- Unknown
|
|
level: high
|
|
enrichment:
|
|
- EN_0001_cache_sysmon_event_id_1_info # http://bit.ly/314zc6x
|
|
- EN_0002_enrich_sysmon_event_id_1_with_parent_info # http://bit.ly/2KmSC0l
|