Detection rules › Sigma
Suspicious Process Patterns NTDS.DIT Exfil
Detects suspicious process patterns used in NTDS.DIT exfiltration
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Credential Access | T1003.003 OS Credential Dumping: NTDS |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
| Security-Auditing | 4688 | A new process has been created. |
Stages and Predicates
Stage 1: 1 of selection_tool
or:
CommandLine|contains: ntds.dit
CommandLine|contains: system.hiv
CommandLine|contains: NTDSgrab.ps1
Image|endswith: '\NTDSDump.exe'
Image|endswith: '\NTDSDumpEx.exe'
Stage 2: 1 of selection_oneliner_1
CommandLine|contains: 'ac i ntds'
CommandLine|contains: 'create full'
Stage 3: 1 of selection_onliner_2
CommandLine|contains: '/c copy '
CommandLine|contains: '\windows\ntds\ntds.dit'
Stage 4: 1 of selection_onliner_3
CommandLine|contains: 'activate instance ntds'
CommandLine|contains: 'create full'
Stage 5: 1 of selection_powershell
CommandLine|contains: ntds.dit
CommandLine|contains: powershell
Stage 6: all of set1_selection_ntds_dit
CommandLine|contains: ntds.dit
Stage 7: all of set1_selection_image_folder
or:
Image|contains: '\AppData\'
Image|contains: '\PerfLogs\'
Image|contains: '\Public\'
Image|contains: '\Temp\'
Image|contains: '\apache'
Image|contains: '\tomcat'
ParentImage|contains: '\AppData\'
ParentImage|contains: '\PerfLogs\'
ParentImage|contains: '\Public\'
ParentImage|contains: '\Temp\'
ParentImage|contains: '\apache'
ParentImage|contains: '\tomcat'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
Image | ends_with |
|
Image | match |
|
ParentImage | match |
|