Rule Content
- title: Suspicious Process Creation
  id: 5f0f47a5-cb16-4dbe-9e31-e8d976d73de3
  description: Detects suspicious process starts on Windows systems based on keywords
  status: experimental
  references:
  - https://www.swordshield.com/2015/07/getting-hashes-from-ntds-dit-file/
  - https://www.youtube.com/watch?v=H3t_kHQG1Js&feature=youtu.be&t=15m35s
  - https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
  - https://twitter.com/subTee/status/872244674609676288
  - https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/remote-tool-examples
  - https://tyranidslair.blogspot.ca/2017/07/dg-on-windows-10-s-executing-arbitrary.html
  - https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/
  - https://subt0x10.blogspot.ca/2017/04/bypassing-application-whitelisting.html
  - https://gist.github.com/subTee/7937a8ef07409715f15b84781e180c46#file-rat-bat
  - https://twitter.com/vector_sec/status/896049052642533376
  - http://security-research.dyndns.org/pub/slides/FIRST-TC-2018/FIRST-TC-2018_Tom-Ueltschi_Sysmon_PUBLIC.pdf
  author: Florian Roth
  modified: 2018/12/11
  tags:
  - car.2013-07-001
  logsource:
    category: process_creation
    product: windows
    service: null
  detection:
    selection:
      CommandLine:
      - vssadmin.exe delete shadows*
      - vssadmin delete shadows*
      - vssadmin create shadow /for=C:*
      - copy \\?\GLOBALROOT\Device\\*\windows\ntds\ntds.dit*
      - copy \\?\GLOBALROOT\Device\\*\config\SAM*
      - reg SAVE HKLM\SYSTEM *
      - reg SAVE HKLM\SAM *
      - '* sekurlsa:*'
      - net localgroup administrators * /add
      - net group "Domain Admins" * /ADD /DOMAIN
      - certutil.exe *-urlcache* http*
      - certutil.exe *-urlcache* ftp*
      - netsh advfirewall firewall *\AppData\\*
      - attrib +S +H +R *\AppData\\*
      - schtasks* /create *\AppData\\*
      - schtasks* /sc minute*
      - '*\Regasm.exe *\AppData\\*'
      - '*\Regasm *\AppData\\*'
      - '*\bitsadmin* /transfer*'
      - '*\certutil.exe * -decode *'
      - '*\certutil.exe * -decodehex *'
      - '*\certutil.exe -ping *'
      - icacls * /grant Everyone:F /T /C /Q
      - '* wmic shadowcopy delete *'
      - '* wbadmin.exe delete catalog -quiet*'
      - '*\wscript.exe *.jse'
      - '*\wscript.exe *.js'
      - '*\wscript.exe *.vba'
      - '*\wscript.exe *.vbe'
      - '*\cscript.exe *.jse'
      - '*\cscript.exe *.js'
      - '*\cscript.exe *.vba'
      - '*\cscript.exe *.vbe'
      - '*\fodhelper.exe'
      - '*waitfor*/s*'
      - '*waitfor*/si persist*'
      - '*remote*/s*'
      - '*remote*/c*'
      - '*remote*/q*'
      - '*AddInProcess*'
      - '* /stext *'
      - '* /scomma *'
      - '* /stab *'
      - '* /stabular *'
      - '* /shtml *'
      - '* /sverhtml *'
      - '* /sxml *'
    condition: selection
  falsepositives:
  - False positives depend on scripts and administrative tools used in the monitored
    environment
  level: medium