Files
hayabusa/rules/sigma/process_creation/win_susp_rpcping.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

52 lines
1.4 KiB
YAML

title: Capture Credentials with Rpcping.exe
author: Julia Fomina, oscd.community
date: 2020/10/09
description: Detects using Rpcping.exe to send a RPC test connection to the target
server (-s) and force the NTLM hash to be sent in the process.
detection:
SELECTION_1:
EventID: 1
SELECTION_10:
CommandLine: '*/t*'
SELECTION_11:
CommandLine: '*ncacn_np*'
SELECTION_2:
Image: '*\rpcping.exe'
SELECTION_3:
CommandLine:
- '*-s*'
- '*/s*'
SELECTION_4:
CommandLine: '*-u*'
SELECTION_5:
CommandLine: '*NTLM*'
SELECTION_6:
CommandLine: '*/u*'
SELECTION_7:
CommandLine: '*NTLM*'
SELECTION_8:
CommandLine: '*-t*'
SELECTION_9:
CommandLine: '*ncacn_np*'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and ((SELECTION_4 and
SELECTION_5) or (SELECTION_6 and SELECTION_7) or (SELECTION_8 and SELECTION_9)
or (SELECTION_10 and SELECTION_11)))
falsepositives:
- Unlikely
id: 93671f99-04eb-4ab4-a161-70d446a84003
level: medium
logsource:
category: process_creation
product: windows
references:
- https://lolbas-project.github.io/lolbas/Binaries/Rpcping/
- https://twitter.com/vysecurity/status/974806438316072960
- https://twitter.com/vysecurity/status/873181705024266241
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh875578(v=ws.11)
status: experimental
tags:
- attack.credential_access
- attack.t1003
ruletype: SIGMA