mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
43 lines
1.2 KiB
YAML
43 lines
1.2 KiB
YAML
---
|
|
action: global
|
|
title: Reconnaissance Activity with Net Command
|
|
status: experimental
|
|
description: 'Detects a set of commands often used in recon stages by different attack groups'
|
|
references:
|
|
- https://twitter.com/haroonmeer/status/939099379834658817
|
|
- https://twitter.com/c_APT_ure/status/939475433711722497
|
|
author: Florian Roth
|
|
date: 2017/12/12
|
|
detection:
|
|
selection:
|
|
CommandLine:
|
|
- 'tasklist'
|
|
- 'net time'
|
|
- 'systeminfo'
|
|
- 'whoami'
|
|
- 'nbtstat'
|
|
- 'net start'
|
|
- '*\net1 start'
|
|
- 'qprocess'
|
|
- 'nslookup'
|
|
timeframe: 1m
|
|
condition: selection | count() > 2
|
|
falsepositives:
|
|
- False positives depend on scripts and administrative tools used in the monitored environment
|
|
level: medium
|
|
---
|
|
logsource:
|
|
product: windows
|
|
service: sysmon
|
|
detection:
|
|
selection:
|
|
EventID: 1
|
|
---
|
|
logsource:
|
|
product: windows
|
|
service: security
|
|
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
|
detection:
|
|
selection:
|
|
EventID: 4688
|