Skip to content

Commit 60b39cc

Browse files
committed
feat(rules): Add Potential NTLM hash leak via MS Photos rule
Detects a potential NTLM hash disclosure via abuse of the ms-photos: URIscheme with a UNC path parameter. An attacker can craft a specially formatted link that, when opened, launches Microsoft Photos directly from a browser and triggers outbound authentication, potentially leaking NTLM credentials.
1 parent 769dcdc commit 60b39cc

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: Potential NTLM hash leak via MS Photos
2+
id: b5b70c6d-e265-477e-bd62-b4d05089e2ab
3+
version: 1.0.0
4+
description: |
5+
Detects a potential NTLM hash disclosure via abuse of the ms-photos: URI
6+
scheme with a UNC path parameter. An attacker can craft a specially formatted
7+
link that, when opened, launches Microsoft Photos directly from a browser and
8+
triggers outbound authentication, potentially leaking NTLM credentials.
9+
labels:
10+
tactic.id: TA0006
11+
tactic.name: Credential Access
12+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
13+
technique.id: T1187
14+
technique.name: Forced Authentication
15+
technique.ref: https://attack.mitre.org/techniques/T1187/
16+
references:
17+
- https://github.com/rubenformation/ms-photos_NTLM_Leak
18+
19+
condition: >
20+
sequence
21+
maxspan 1m
22+
|spawn_process and
23+
ps.parent.name ~= 'explorer.exe' and ps.name ~= 'Photos.exe' and
24+
ps.cmdline imatches '*ms-photos:viewer?fileName=%5C%5C*%5C*%5C*'
25+
|
26+
|connect_socket and
27+
evt.pid = 4 and net.dport = 445 and not cidr_contains(net.dip,
28+
'127.0.0.0/8',
29+
'10.0.0.0/8',
30+
'172.16.0.0/12', '192.168.0.0/16')
31+
|
32+
33+
output: >
34+
Potential NTLM hash leak via MS Photos UNC path at address $2.net.dip
35+
severity: high
36+
37+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)