Files
hayabusa/rules/sigma/process_creation/win_hack_bloodhound.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

55 lines
1.3 KiB
YAML

title: Bloodhound and Sharphound Hack Tool
author: Florian Roth
date: 2019/12/20
description: Detects command line parameters used by Bloodhound and Sharphound hack
tools
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image:
- '*\Bloodhound.exe*'
- '*\SharpHound.exe*'
SELECTION_3:
CommandLine:
- '* -CollectionMethod All *'
- '*.exe -c All -d *'
- '*Invoke-Bloodhound*'
- '*Get-BloodHoundData*'
SELECTION_4:
CommandLine: '* -JsonFolder *'
SELECTION_5:
CommandLine: '* -ZipFileName *'
SELECTION_6:
CommandLine: '* DCOnly *'
SELECTION_7:
CommandLine: '* --NoSaveCache *'
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or (SELECTION_4 and SELECTION_5)
or (SELECTION_6 and SELECTION_7)))
falsepositives:
- Other programs that use these command line option and accepts an 'All' parameter
id: f376c8a7-a2d0-4ddc-aa0c-16c17236d962
level: high
logsource:
category: process_creation
product: windows
modified: 2019/12/21
references:
- https://github.com/BloodHoundAD/BloodHound
- https://github.com/BloodHoundAD/SharpHound
status: experimental
tags:
- attack.discovery
- attack.t1087.001
- attack.t1087.002
- attack.t1087
- attack.t1482
- attack.t1069.001
- attack.t1069.002
- attack.t1069
- attack.execution
- attack.t1059.001
- attack.t1086
ruletype: SIGMA