Detection rules › Sigma

HackTool - CrackMapExec Process Patterns

Severity
high
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects suspicious process patterns found in logs when CrackMapExec is used

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003.001 OS Credential Dumping: LSASS Memory

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: 1 of selection_lsass_dump1

or:
CommandLine|contains: 'cmd /c '
CommandLine|contains: 'cmd /k '
CommandLine|contains: 'cmd /r '
CommandLine|contains: 'cmd.exe /c '
CommandLine|contains: 'cmd.exe /k '
CommandLine|contains: 'cmd.exe /r '
or:
User|contains: AUTHORI
User|contains: AUTORI
CommandLine|contains: 'Imagename eq lsass.exe'
CommandLine|contains: 'tasklist /fi '

Stage 2: 1 of selection_lsass_dump2

CommandLine|contains: ' full'
CommandLine|contains: '%%B'
CommandLine|contains: '\Windows\Temp\'
CommandLine|contains: 'do rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump'

Stage 3: 1 of selection_procdump

CommandLine|contains: 'findstr /i "lsass"'
CommandLine|contains: 'tasklist /v /fo csv'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • full
  • %%B
  • Imagename eq lsass.exe
  • \Windows\Temp\ corpus 10 (sigma 10)
  • cmd /c corpus 5 (sigma 5)
  • cmd /k corpus 5 (sigma 5)
  • cmd /r corpus 5 (sigma 5)
  • cmd.exe /c corpus 6 (sigma 6)
  • cmd.exe /k corpus 6 (sigma 6)
  • cmd.exe /r corpus 6 (sigma 6)
  • do rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump
  • findstr /i "lsass"
  • tasklist /fi
  • tasklist /v /fo csv
Usermatch
  • AUTHORI corpus 16 (sigma 16)
  • AUTORI corpus 16 (sigma 16)