Skip to content

Commit ddf9d10

Browse files
authored
Merge pull request #806 from splunk/misko_category_fixes_cred_extract
Fixing categories & text in Credential Extraction detections
2 parents c62d2f0 + e541880 commit ddf9d10

6 files changed

+50
-48
lines changed

detections/endpoint/credential_extraction_fgdump_cachedump_s_option_ssa.yml

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ date: '2020-10-18'
55
description: Credential extraction is often an illegal recovery of credential material
66
from secured authentication resources and repositories. This process may also involve
77
decryption or other transformations of the stored credential material.
8-
FGdump is a newer version of the pwdump tool for extracting NTLM and LanMan password hashes from Windows.
9-
Cachedump is a publicly-available tool that program extracts cached password hashes from a system's registry.
10-
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including event ID 4688 with enabled command line logging.
8+
FGdump is a newer version of pwdump tool that extracts NTLM and LanMan password hashes from Windows.
9+
Cachedump is a publicly-available tool that extracts cached password hashes from a system's registry.
10+
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including the event ID 4688 with enabled command line logging.
1111
references: []
1212
type: SSA
1313
author: Stanislav Miskovic, Splunk
@@ -30,20 +30,21 @@ search: ' | from read_ssa_enriched_events()
3030
ucast(map_get(input_event, "dest_device_id"), "string", null)),
3131
body = "TBD"
3232
| into write_ssa_detected_events();'
33-
eli5: "This detection identifies one of the stages of FGdump in which CacheDump is called.
34-
It may also be the case that the detected CacheDump activity is embedded in some exploit tool other than FGdump.
33+
eli5: "This detection identifies one of the inevitable stages of FGdump in which CacheDump is called.
34+
Note, CacheDump activity may also be embedded in other exploit tools.
3535
For more details on FGdump stages see https://github.com/interference-security/kali-windows-binaries/tree/master/fgdump"
3636
known_false_positives:
37-
"None"
37+
"None identified."
3838
tags:
3939
cis20:
40-
- CIS 8
40+
- CIS 16
4141
kill_chain_phases:
42-
- Credential Access
42+
- Actions on Objectives
4343
mitre_technique_id:
4444
- T1003
4545
nist:
46-
- PR.PT
47-
- DE.CM
46+
- PR.AC
47+
- PR.IP
4848
risk_severity: high
4949
security_domain: endpoint
50+
asset_type: Windows

detections/endpoint/credential_extraction_fgdump_cachedump_v_option_ssa.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ date: '2020-10-18'
55
description: Credential extraction is often an illegal recovery of credential material
66
from secured authentication resources and repositories. This process may also involve
77
decryption or other transformations of the stored credential material.
8-
FGdump is a newer version of the pwdump tool for extracting NTLM and LanMan password hashes from Windows.
9-
Cachedump is a publicly-available tool that program extracts cached password hashes from a system's registry.
10-
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including event ID 4688 with enabled command line logging.
8+
FGdump is a newer version of pwdump tool that extracts NTLM and LanMan password hashes from Windows.
9+
Cachedump is a publicly-available tool that extracts cached password hashes from a system's registry.
10+
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including the event ID 4688 with enabled command line logging.
1111
references: []
1212
type: SSA
1313
author: Stanislav Miskovic, Splunk
@@ -29,20 +29,20 @@ search: ' | from read_ssa_enriched_events()
2929
body = "TBD"
3030
| into write_ssa_detected_events();'
3131
eli5: "This detection identifies one of the stages of FGdump in which CacheDump is called.
32-
It may also be the case that the detected CacheDump activity is embedded in some exploit tool other than FGdump.
32+
Note, CacheDump activity may also be embedded in other exploit tools.
3333
For more details on FGdump stages see https://github.com/interference-security/kali-windows-binaries/tree/master/fgdump"
3434
known_false_positives:
35-
"None"
35+
"None identified."
3636
tags:
3737
cis20:
38-
- CIS 8
38+
- CIS 16
3939
kill_chain_phases:
40-
- Credential Access
40+
- Actions on Objectives
4141
mitre_technique_id:
4242
- T1003
4343
nist:
44-
- PR.PT
45-
- DE.CM
44+
- PR.AC
45+
- PR.IP
4646
risk_severity: high
4747
security_domain: endpoint
48-
48+
asset_type: Windows

detections/endpoint/credential_extraction_getaddbaccount_from_dump_ssa.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ date: '2020-10-18'
55
description: Credential extraction is often an illegal recovery of credential material
66
from secured authentication resources and repositories. This process may also involve
77
decryption or other transformations of the stored credential material.
8-
PowerSploit and DSInternals are common exploit APIs offering PowerShell modules with various exploits of Windows and Active Directory environments.
9-
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including event ID 4688 with enabled command line logging.
8+
PowerSploit and DSInternals are common exploit APIs offering PowerShell modules for various exploits of Windows and Active Directory environments.
9+
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including the event ID 4688 with enabled command line logging.
1010
references: []
1111
type: SSA
1212
author: Stanislav Miskovic, Splunk
@@ -26,17 +26,17 @@ search: ' | from read_ssa_enriched_events()
2626
| into write_ssa_detected_events();'
2727
eli5: "This detection identifies triggering of the PowerSploit or DSInternals for extraction of all accounts from a previously dumped ntds.dit credential store."
2828
known_false_positives:
29-
"None"
29+
"None identified."
3030
tags:
3131
cis20:
32-
- CIS 8
32+
- CIS 16
3333
kill_chain_phases:
34-
- Credential Access
34+
- Actions on Objectives
3535
mitre_technique_id:
3636
- T1003
3737
nist:
38-
- PR.PT
39-
- DE.CM
38+
- PR.IP
39+
- PR.AC
4040
risk_severity: high
4141
security_domain: endpoint
42-
42+
asset_type: Windows

detections/endpoint/credential_extraction_lazagne_command_options_ssa.yml

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ date: '2020-10-18'
55
description: Credential extraction is often an illegal recovery of credential material
66
from secured authentication resources and repositories. This process may also involve
77
decryption or other transformations of the stored credential material.
8-
LaZagne is tool that extracts various kinds of credentials from a local computer, including account passwords, domain passwords, browser passwords, etc.
9-
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including event ID 4688 with enabled command line logging.
8+
LaZagne is a tool that extracts various kinds of credentials from a local computer, including account passwords, domain passwords, browser passwords, etc.
9+
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including the event ID 4688 with enabled command line logging.
1010
references: []
1111
type: SSA
1212
author: Stanislav Miskovic, Splunk
@@ -26,17 +26,18 @@ search: ' | from read_ssa_enriched_events()
2626
eli5: "This detection identifies the most common LaZagne invocation, in which it is instructed to extract all available passwords and output them to a file.
2727
For more details on LaZagne see https://github.com/AlessandroZ/LaZagne"
2828
known_false_positives:
29-
"None"
29+
"None identified."
3030
tags:
3131
cis20:
32-
- CIS 8
32+
- CIS 16
3333
kill_chain_phases:
34-
- Credential Access
34+
- Actions on Objectives
3535
mitre_technique_id:
3636
- T1003
37+
- T1555
3738
nist:
38-
- PR.PT
39-
- DE.CM
39+
- PR.IP
40+
- PR.AC
4041
risk_severity: high
4142
security_domain: endpoint
42-
43+
asset_type: Windows

detections/endpoint/credential_extraction_ms_debuggers_kernel_peek.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: Credential extraction is often an illegal recovery of credential ma
77
decryption or other transformations of the stored credential material.
88
Native Microsoft debuggers, such as kd, ntkd, livekd and windbg, can be leveraged to read credential material directly from
99
memory and process dumps.
10-
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including event ID 4688 with enabled command line logging.
10+
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including the event ID 4688 with enabled command line logging.
1111
references: [https://medium.com/@clermont1050/covid-19-cyber-infection-c615ead7c29]
1212
type: SSA
1313
author: Stanislav Miskovic, Splunk
@@ -37,14 +37,14 @@ known_false_positives:
3737
Note, even for developers this is an unusual way of working on code - debuggers are mostly used to step through code, not analyze its crash dumps."
3838
tags:
3939
cis20:
40-
- CIS 8
40+
- CIS 16
4141
kill_chain_phases:
42-
- Credential Access
42+
- Actions on Objectives
4343
mitre_technique_id:
4444
- T1003
4545
nist:
46-
- PR.PT
47-
- DE.CM
46+
- PR.IP
47+
- PR.AC
4848
risk_severity: medium
4949
security_domain: endpoint
50-
50+
asset_type: Windows

detections/endpoint/credential_extraction_ms_debuggers_z_option.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: Credential extraction is often an illegal recovery of credential ma
77
decryption or other transformations of the stored credential material.
88
Native Microsoft debuggers, such as kd, ntkd, livekd and windbg, can be leveraged to read credential material directly from
99
memory and process dumps.
10-
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including event ID 4688 with enabled command line logging.
10+
how_to_implement: You must be ingesting Windows Security logs from devices of interest, including the event ID 4688 with enabled command line logging.
1111
references: []
1212
type: SSA
1313
author: Stanislav Miskovic, Splunk
@@ -35,14 +35,14 @@ known_false_positives:
3535
Note, even for developers this is an unusual way of working on code - debuggers are mostly used to step through code, not analyze its crash dumps."
3636
tags:
3737
cis20:
38-
- CIS 8
38+
- CIS 16
3939
kill_chain_phases:
40-
- Credential Access
40+
- Actions on Objectives
4141
mitre_technique_id:
4242
- T1003
4343
nist:
44-
- PR.PT
45-
- DE.CM
44+
- PR.AC
45+
- PR.IP
4646
risk_severity: medium
4747
security_domain: endpoint
48-
48+
asset_type: Windows

0 commit comments

Comments
 (0)