Files
hayabusa/rules/sigma/image_load/sysmon_uipromptforcreds_dlls.yml
T
itiB 83d891b2fa Feature/rm submodule (#312)
* rm: submodule

* Add: rules

* Fix: hayabusa-rules to c9c10a
2021-12-20 21:14:32 +09:00

49 lines
1.6 KiB
YAML

title: UIPromptForCredentials DLLs
ruletype: Sigma
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/20
description: Detects potential use of UIPromptForCredentials functions by looking
for some of the DLLs needed for it.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\credui.dll'
- '*\wincredui.dll'
SELECTION_3:
OriginalFileName:
- credui.dll
- wincredui.dll
SELECTION_4:
Image:
- C:\Windows\System32\\*
- C:\Windows\explorer.exe*
- C:\Program Files\\*
- C:\Users\\*\AppData\Local\Microsoft\OneDrive\\*\Microsoft.SharePoint.exe*
- C:\Program Files (x86)\\*
- C:\Windows\ImmersiveControlPanel\SystemSettings.exe*
- C:\Users\\*\AppData\Local\Microsoft\OneDrive\OneDrive.exe*
SELECTION_5:
Image: '*\opera_autoupdate.exe'
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3) and not (SELECTION_4 or
SELECTION_5))
falsepositives:
- other legitimate processes loading those DLLs in your environment.
id: 9ae01559-cf7e-4f8e-8e14-4c290a1b4784
level: medium
logsource:
category: image_load
product: windows
modified: 2021/12/03
references:
- https://securitydatasets.com/notebooks/small/windows/06_credential_access/SDWIN-201020013208.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password
- https://docs.microsoft.com/en-us/windows/win32/api/wincred/nf-wincred-creduipromptforcredentialsa
status: experimental
tags:
- attack.credential_access
- attack.collection
- attack.t1056.002