Files
hayabusa/rules/Sigma/win_susp_rpcping.yml
T
2021-11-14 11:00:56 +09:00

53 lines
1.6 KiB
YAML

title: Capture Credentials with Rpcping.exe
author: Julia Fomina, oscd.community
date: 2020/10/09
description: Detects using Rpcping.exe to send a RPC test connection to the target
server (-s) and force the NTLM hash to be sent in the process.
detection:
SELECTION_1:
EventID: 1
SELECTION_10:
CommandLine: '*ncacn_np*'
SELECTION_11:
CommandLine: '*/t*'
SELECTION_12:
CommandLine: '*ncacn_np*'
SELECTION_2:
Image: '*\rpcping.exe'
SELECTION_3:
CommandLine: '*-s*'
SELECTION_4:
CommandLine: '*/s*'
SELECTION_5:
CommandLine: '*-u*'
SELECTION_6:
CommandLine: '*NTLM*'
SELECTION_7:
CommandLine: '*/u*'
SELECTION_8:
CommandLine: '*NTLM*'
SELECTION_9:
CommandLine: '*-t*'
condition: (SELECTION_1 and (SELECTION_2 and (SELECTION_3 or SELECTION_4)) and
((SELECTION_5 and SELECTION_6) or (SELECTION_7 and SELECTION_8) or (SELECTION_9
and SELECTION_10) or (SELECTION_11 and SELECTION_12)))
falsepositives:
- Unlikely
id: 93671f99-04eb-4ab4-a161-70d446a84003
level: medium
logsource:
category: process_creation
product: windows
references:
- https://lolbas-project.github.io/lolbas/Binaries/Rpcping/
- https://twitter.com/vysecurity/status/974806438316072960
- https://twitter.com/vysecurity/status/873181705024266241
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh875578(v=ws.11)
status: experimental
tags:
- attack.credential_access
- attack.t1003
yml_filename: win_susp_rpcping.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation