|
| 1 | +name: Suspicious Vault client DLL load |
| 2 | +id: 64af2e2e-2309-4079-9c0f-985f1dd930f5 |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Identifies loading of the Vault client DLL by an unusual process. Adversaries can abuse the functions provided |
| 6 | + by the Credential Vault Client Library to enumerate or harvest saved credentials. |
| 7 | +labels: |
| 8 | + tactic.id: TA0006 |
| 9 | + tactic.name: Credential Access |
| 10 | + tactic.ref: https://attack.mitre.org/tactics/TA0006/ |
| 11 | + technique.id: T1555 |
| 12 | + technique.name: Credentials from Password Stores |
| 13 | + technique.ref: https://attack.mitre.org/techniques/T1555/ |
| 14 | + subtechnique.id: T1555.004 |
| 15 | + subtechnique.name: Windows Credential Manager |
| 16 | + subtechnique.ref: https://attack.mitre.org/techniques/T1555/004/ |
| 17 | +references: |
| 18 | + - https://redcanary.com/blog/incident-response/active-breach-evading-defenses/ |
| 19 | + - https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 |
| 20 | + |
| 21 | +condition: > |
| 22 | + sequence |
| 23 | + maxspan 2m |
| 24 | + |spawn_process and ps.exe != '' |
| 25 | + and |
| 26 | + not |
| 27 | + ( |
| 28 | + ps.child.exe imatches |
| 29 | + ( |
| 30 | + '?:\\Windows\\System32\\MDMAppInstaller.exe', |
| 31 | + '?:\\Windows\\uus\\*\\MoUsoCoreWorker.exe', |
| 32 | + '?:\\Windows\\Microsoft.NET\\Framework64\\*\\dfsvc.exe', |
| 33 | + '?:\\Windows\\Microsoft.NET\\Framework64\\*\\mscorsvw.exe', |
| 34 | + '?:\\Program Files\\*.exe', |
| 35 | + '?:\\Program Files (x86)\\*.exe', |
| 36 | + '?:\\Windows\\winsxs\\*\\TiWorker.exe' |
| 37 | + ) |
| 38 | + or |
| 39 | + (ps.child.exe imatches '?:\\WINDOWS\\System32\\taskhostw.exe' and ps.args intersects ('-k', 'netsvcs', '-p', '-s', 'Schedule')) |
| 40 | + or |
| 41 | + (ps.child.exe imatches '?:\\Windows\\System32\\RuntimeBroker.exe') |
| 42 | + or |
| 43 | + (ps.exe imatches ('?:\\Program Files\\WindowsApps\\Microsoft.*.exe', '?:\\Windows\\Microsoft.NET\\Framework*\\NGenTask.exe')) |
| 44 | + or |
| 45 | + (ps.child.exe imatches '?:\\WINDOWS\\System32\\svchost.exe' and ps.child.args intersects ('-k', 'wusvcs', '-p', '-s', 'WaaSMedicSvc')) |
| 46 | + or |
| 47 | + (ps.child.exe imatches '?:\\WINDOWS\\System32\\svchost.exe' and ps.child.args intersects ('-k', 'netsvcs', '-p', '-s', 'TokenBroker')) |
| 48 | + or |
| 49 | + (ps.child.exe imatches '?:\\WINDOWS\\system32\\BackgroundTaskHost.exe' and ps.child.args not in ('-ServerName:BackgroundTaskHost.WebAccountProvider')) |
| 50 | + ) |
| 51 | + | by ps.child.uuid |
| 52 | + |load_dll and image.name ~= 'vaultcli.dll'| by ps.uuid |
| 53 | +
|
| 54 | +output: > |
| 55 | + Suspicious process %2.ps.exe loaded the Credential Vault Client DLL for potential credentials harvesting |
| 56 | +severity: high |
| 57 | + |
| 58 | +min-engine-version: 2.4.0 |
0 commit comments