Detection rules › Sigma
Transferring Files with Credential Data via Network Shares
Transferring files with well-known filenames (sensitive files with credential data) using network shares
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Credential Access | T1003.001 OS Credential Dumping: LSASS Memory, T1003.002 OS Credential Dumping: Security Account Manager, T1003.003 OS Credential Dumping: NTDS |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Security-Auditing | 5145 | A network share object was checked to see whether client can be granted desired access. |
Stages and Predicates
Stage 1: all of selection_eid
Stage 2: all of selection_object
or:
RelativeTargetName: 'Windows\NTDS\ntds.dit'
RelativeTargetName: 'Windows\System32\config\SAM'
RelativeTargetName: 'Windows\System32\config\SECURITY'
RelativeTargetName: 'Windows\System32\config\SYSTEM'
RelativeTargetName|contains: '\hiberfil'
RelativeTargetName|contains: '\lsass'
RelativeTargetName|contains: '\mimidrv'
RelativeTargetName|contains: '\sqldmpr'
RelativeTargetName|contains: '\windows\minidump\'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
RelativeTargetName | eq |
|
RelativeTargetName | match |
|
Neighbors
Stricter alternatives (narrower than this rule)
The rules below may be useful if you find the current rule is too noisy / lacks specificity.
- Potential Machine Account Relay Attack via SMB (adds 6 filters)
- Executable File Written in Administrative SMB Share (adds 5 filters)
- High Frequency Copy Of Files In Network Share (adds 5 filters)
- PetitPotam Network Share Access Request (adds 3 filters)
- Possible PetitPotam Coerce Authentication Attempt (adds 4 filters)
- Remote Task Creation via ATSVC Named Pipe (adds 3 filters)
- Possible Impacket SecretDump Remote Activity (adds 3 filters)
- Windows Network Access Suspicious desktop.ini Action (adds 3 filters)
- Remote Service Activity via SVCCTL Named Pipe (adds 3 filters)
- DCERPC SMB Spoolss Named Pipe (adds 2 filters)
- Impacket PsExec Execution (adds 2 filters)
- Protected Storage Service Access (adds 2 filters)
- SMB Create Remote File Admin Share (adds 2 filters)
- Suspicious PsExec Execution (adds 2 filters)
- DCOM InternetExplorer.Application Iertutil DLL Hijack - Security (adds 1 filter)
- First Time Seen Remote Named Pipe (adds 1 filter)
- Suspicious Access to Sensitive File Extensions (adds 1 filter)
- T1047 Wmiprvse Wbemcomn DLL Hijack (adds 1 filter)