Files
hayabusa/rules/Sigma/win_hack_bloodhound.yml
2021-11-14 11:00:56 +09:00

58 lines
1.6 KiB
YAML

title: Bloodhound and Sharphound Hack Tool
author: Florian Roth
date: 2019/12/20
description: Detects command line parameters used by Bloodhound and Sharphound hack
tools
detection:
SELECTION_1:
EventID: 1
SELECTION_10:
CommandLine: '* DCOnly *'
SELECTION_11:
CommandLine: '* --NoSaveCache *'
SELECTION_2:
Image: '*\Bloodhound.exe*'
SELECTION_3:
Image: '*\SharpHound.exe*'
SELECTION_4:
CommandLine: '* -CollectionMethod All *'
SELECTION_5:
CommandLine: '*.exe -c All -d *'
SELECTION_6:
CommandLine: '*Invoke-Bloodhound*'
SELECTION_7:
CommandLine: '*Get-BloodHoundData*'
SELECTION_8:
CommandLine: '* -JsonFolder *'
SELECTION_9:
CommandLine: '* -ZipFileName *'
condition: (SELECTION_1 and ((SELECTION_2 or SELECTION_3) or (SELECTION_4 or SELECTION_5
or SELECTION_6 or SELECTION_7) or (SELECTION_8 and SELECTION_9) or (SELECTION_10
and SELECTION_11)))
falsepositives:
- Other programs that use these command line option and accepts an 'All' parameter
id: f376c8a7-a2d0-4ddc-aa0c-16c17236d962
level: high
logsource:
category: process_creation
product: windows
modified: 2019/12/21
references:
- https://github.com/BloodHoundAD/BloodHound
- https://github.com/BloodHoundAD/SharpHound
tags:
- attack.discovery
- attack.t1087.001
- attack.t1087.002
- attack.t1087
- attack.t1482
- attack.t1069.001
- attack.t1069.002
- attack.t1069
- attack.execution
- attack.t1059.001
- attack.t1086
yml_filename: win_hack_bloodhound.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation