Skip to content

Commit 070e642

Browse files
committed
feat(rules): Suspicious Vault client DLL load
Identifies loading of the Vault client DLL by an unusual process. Adversaries can abuse the functions provided by the Credential Vault Client Library to enumerate or harvest saved credentials.
1 parent 63a735e commit 070e642

File tree

1 file changed

+58
-0
lines changed

1 file changed

+58
-0
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
name: Suspicious Vault client DLL load
2+
id: 64af2e2e-2309-4079-9c0f-985f1dd930f5
3+
version: 1.0.0
4+
description: |
5+
Identifies loading of the Vault client DLL by an unusual process. Adversaries can abuse the functions provided
6+
by the Credential Vault Client Library to enumerate or harvest saved credentials.
7+
labels:
8+
tactic.id: TA0006
9+
tactic.name: Credential Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
11+
technique.id: T1555
12+
technique.name: Credentials from Password Stores
13+
technique.ref: https://attack.mitre.org/techniques/T1555/
14+
subtechnique.id: T1555.004
15+
subtechnique.name: Windows Credential Manager
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1555/004/
17+
references:
18+
- https://redcanary.com/blog/incident-response/active-breach-evading-defenses/
19+
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
20+
21+
condition: >
22+
sequence
23+
maxspan 2m
24+
|spawn_process and ps.exe != ''
25+
and
26+
not
27+
(
28+
ps.child.exe imatches
29+
(
30+
'?:\\Windows\\System32\\MDMAppInstaller.exe',
31+
'?:\\Windows\\uus\\*\\MoUsoCoreWorker.exe',
32+
'?:\\Windows\\Microsoft.NET\\Framework64\\*\\dfsvc.exe',
33+
'?:\\Windows\\Microsoft.NET\\Framework64\\*\\mscorsvw.exe',
34+
'?:\\Program Files\\*.exe',
35+
'?:\\Program Files (x86)\\*.exe',
36+
'?:\\Windows\\winsxs\\*\\TiWorker.exe'
37+
)
38+
or
39+
(ps.child.exe imatches '?:\\WINDOWS\\System32\\taskhostw.exe' and ps.args intersects ('-k', 'netsvcs', '-p', '-s', 'Schedule'))
40+
or
41+
(ps.child.exe imatches '?:\\Windows\\System32\\RuntimeBroker.exe')
42+
or
43+
(ps.exe imatches ('?:\\Program Files\\WindowsApps\\Microsoft.*.exe', '?:\\Windows\\Microsoft.NET\\Framework*\\NGenTask.exe'))
44+
or
45+
(ps.child.exe imatches '?:\\WINDOWS\\System32\\svchost.exe' and ps.child.args intersects ('-k', 'wusvcs', '-p', '-s', 'WaaSMedicSvc'))
46+
or
47+
(ps.child.exe imatches '?:\\WINDOWS\\System32\\svchost.exe' and ps.child.args intersects ('-k', 'netsvcs', '-p', '-s', 'TokenBroker'))
48+
or
49+
(ps.child.exe imatches '?:\\WINDOWS\\system32\\BackgroundTaskHost.exe' and ps.child.args not in ('-ServerName:BackgroundTaskHost.WebAccountProvider'))
50+
)
51+
| by ps.child.uuid
52+
|load_dll and image.name ~= 'vaultcli.dll'| by ps.uuid
53+
54+
output: >
55+
Suspicious process %2.ps.exe loaded the Credential Vault Client DLL for potential credentials harvesting
56+
severity: high
57+
58+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)