Detection rules › Sigma

HackTool - Bloodhound/Sharphound Execution

Severity
high
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects command line parameters used by Bloodhound and Sharphound hack tools

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1059.001 Command and Scripting Interpreter: PowerShell
DiscoveryT1069.001 Permission Groups Discovery: Local Groups, T1069.002 Permission Groups Discovery: Domain Groups, T1087.001 Account Discovery: Local Account, T1087.002 Account Discovery: Domain Account, T1482 Domain Trust Discovery

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: 1 of selection_img

or:
Company|contains: SpecterOps
Company|contains: 'evil corp'
Description|contains: SharpHound
Image|contains: '\Bloodhound.exe'
Image|contains: '\SharpHound.exe'
Product|contains: SharpHound

Stage 2: 1 of selection_cli_1

or:
CommandLine|contains: ' --CollectionMethods Session '
CommandLine|contains: ' --Loop --Loopduration '
CommandLine|contains: ' --PortScanTimeout '
CommandLine|contains: ' -CollectionMethod All '
CommandLine|contains: '.exe -c All -d '
CommandLine|contains: Get-BloodHoundData
CommandLine|contains: Invoke-Bloodhound

Stage 3: 1 of selection_cli_2

CommandLine|contains: ' -JsonFolder '
CommandLine|contains: ' -ZipFileName '

Stage 4: 1 of selection_cli_3

CommandLine|contains: ' --NoSaveCache '
CommandLine|contains: ' DCOnly '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • --CollectionMethods Session
  • --Loop --Loopduration
  • --NoSaveCache
  • --PortScanTimeout
  • -CollectionMethod All
  • -JsonFolder
  • -ZipFileName
  • DCOnly
  • .exe -c All -d
  • Get-BloodHoundData
  • Invoke-Bloodhound
Companymatch
  • SpecterOps
  • evil corp
Descriptionmatch
  • SharpHound
Imagematch
  • \Bloodhound.exe
  • \SharpHound.exe
Productmatch
  • SharpHound