SigmaHQ/rules/windows/builtin/win_susp_rottenpotato.yml
2021-07-07 09:05:00 +02:00

29 lines
809 B
YAML

title: RottenPotato Like Attack Pattern
id: 16f5d8ca-44bd-47c8-acbe-6fc95a16c12f
status: experimental
description: Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like
references:
- https://twitter.com/SBousseaden/status/1195284233729777665
author: "@SBousseaden, Florian Roth"
date: 2019/11/15
modified: 2021/07/07
tags:
- attack.privilege_escalation
- attack.credential_access
- attack.t1171 # an old one
- attack.t1557.001
logsource:
product: windows
service: security
detection:
selection:
EventID: 4624
LogonType: 3
TargetUserName: 'ANONYMOUS_LOGON'
WorkstationName: '-'
IpAddress: '127.0.0.1'
condition: selection
falsepositives:
- Unknown
level: high