38 lines
1.3 KiB
YAML
38 lines
1.3 KiB
YAML
title: Lateral Movement Indicator ConDrv
|
|
author: Janantha Marasinghe
|
|
date: 2021/04/27
|
|
description: This event was observed on the target host during lateral movement. The
|
|
process name within the event contains the process spawned post compromise. Account
|
|
Name within the event contains the compromised user account name. This event should
|
|
to be correlated with 4624 and 4688 for further intrusion context.
|
|
detection:
|
|
SELECTION_1:
|
|
EventID: 4674
|
|
SELECTION_2:
|
|
ObjectServer: Security
|
|
SELECTION_3:
|
|
ObjectType: File
|
|
SELECTION_4:
|
|
ObjectName: \Device\ConDrv
|
|
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
|
|
falsepositives:
|
|
- Penetration tests where lateral movement has occurred. This event will be created
|
|
on the target host.
|
|
id: 29d31aee-30f4-4006-85a9-a4a02d65306c
|
|
level: high
|
|
logsource:
|
|
product: windows
|
|
service: security
|
|
references:
|
|
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/wmiexec-vbs.htm
|
|
- https://www.fireeye.com/blog/threat-research/2017/08/monitoring-windows-console-activity-part-one.html
|
|
status: stable
|
|
tags:
|
|
- attack.lateral_movement
|
|
- attack.execution
|
|
- attack.t1021
|
|
- attack.t1059
|
|
yml_filename: win_lateral_movement_condrv.yml
|
|
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/other
|
|
|