atomic-threat-coverage/detection_rules/sysmon_dns_serverlevelplugindll.yml
2019-02-12 04:55:11 +01:00

31 lines
841 B
YAML
Executable File

title: DNS ServerLevelPluginDll Install
status: experimental
description: Detects the installation of a plugin DLL via ServerLevelPluginDll parameter in Registry, which can be used to execute code in context of the DNS server (restart required)
references:
- https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
date: 2017/05/08
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
dnsadmin:
EventID: 1
CommandLine: 'dnscmd.exe /config /serverlevelplugindll *'
dnsregmod:
EventID: 13
TargetObject: '*\services\DNS\Parameters\ServerLevelPluginDll'
condition: 1 of them
fields:
- EventID
- CommandLine
- ParentCommandLine
- Image
- User
- TargetObject
falsepositives:
- unknown
level: high