Detection rules › Sigma

HackTool - Potential Remote Credential Dumping Activity Via CrackMapExec Or Impacket-Secretsdump

Severity
high
Author
SecurityAura
Source
upstream

Detects default filenames output from the execution of CrackMapExec and Impacket-secretsdump against an endpoint.

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003 OS Credential Dumping

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection

Image|endswith: '\svchost.exe'
TargetFilename|re: '\\Windows\\System32\\[a-zA-Z0-9]{8}\.tmp$'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Imageends_with
  • \svchost.exe corpus 20 (sigma 20)
TargetFilenameregex_match
  • \\Windows\\System32\\[a-zA-Z0-9]{8}\.tmp$