SigmaHQ/rules/windows/process_creation/process_creation_discover_private_keys.yml
2021-07-20 12:22:31 +02:00

41 lines
1018 B
YAML

title: Discover Private Keys
id: 213d6a77-3d55-4ce8-ba74-fcfef741974e
status: experimental
author: frack113
date: 2021/07/20
description: Adversaries may search for private key certificate files on compromised systems for insecurely stored credential
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1552.004/T1552.004.md
tags:
- attack.credential_access
- attack.t1552.004
logsource:
category: process_creation
product: windows
detection:
selection_exe:
CommandLine|contains:
- 'dir '
- 'findstr '
selection_ext:
CommandLine|contains:
- '.key'
- '.pgp'
- '.gpg'
- '.ppk'
- '.p12'
- '.pem'
- '.pfx'
- '.cer'
- '.p7b'
- '.asc'
condition: selection_exe and selection_ext
fields:
- ComputerName
- User
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: medium