Detection rules › Sigma

Transferring Files with Credential Data via Network Shares

Severity
medium
Author
Teymur Kheirkhabarov, oscd.community
Source
upstream

Transferring files with well-known filenames (sensitive files with credential data) using network shares

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003.001 OS Credential Dumping: LSASS Memory, T1003.002 OS Credential Dumping: Security Account Manager, T1003.003 OS Credential Dumping: NTDS

Event coverage

ProviderEvent IDTitle
Security-Auditing5145A network share object was checked to see whether client can be granted desired access.

Stages and Predicates

Stage 1: all of selection_eid

Stage 2: all of selection_object

or:
RelativeTargetName: 'Windows\NTDS\ntds.dit'
RelativeTargetName: 'Windows\System32\config\SAM'
RelativeTargetName: 'Windows\System32\config\SECURITY'
RelativeTargetName: 'Windows\System32\config\SYSTEM'
RelativeTargetName|contains: '\hiberfil'
RelativeTargetName|contains: '\lsass'
RelativeTargetName|contains: '\mimidrv'
RelativeTargetName|contains: '\sqldmpr'
RelativeTargetName|contains: '\windows\minidump\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
RelativeTargetNameeq
  • Windows\NTDS\ntds.dit
  • Windows\System32\config\SAM
  • Windows\System32\config\SECURITY
  • Windows\System32\config\SYSTEM
RelativeTargetNamematch
  • \hiberfil
  • \lsass
  • \mimidrv
  • \sqldmpr
  • \windows\minidump\

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.