SigmaHQ/rules/windows/process_creation/win_netsh_wifi_credential_harvesting.yml
2020-11-28 10:39:37 +01:00

30 lines
889 B
YAML

title: Harvesting of Wifi Credentials Using netsh.exe
id: 42b1a5b8-353f-4f10-b256-39de4467faff
status: experimental
description: Detect the harvesting of wifi credentials using netsh.exe
references:
- https://blog.malwarebytes.com/threat-analysis/2020/04/new-agenttesla-variant-steals-wifi-credentials/
author: Andreas Hunkeler (@Karneades), oscd.community
date: 2020/04/20
modified: 2020/11/28
tags:
- attack.discovery
- attack.credential_access
- attack.t1040
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\netsh.exe'
CommandLine|contains|all:
- 'wlan'
- ' s'
- ' p'
- ' k'
- '=clear'
condition: selection
falsepositives:
- Legitimate administrator or user uses netsh.exe wlan functionality for legitimate reason
level: medium