Skip to content

Commit c76acf2

Browse files
committed
feat(rules): Suspicious Vault client DLL load
Identifies loading of the Vault client DLL by an unusual process. Adversaries can abuse the functions provided by the Credential Vault Client Library to enumerate or harvest saved credentials.
1 parent fd099e9 commit c76acf2

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
name: Suspicious Vault client DLL load
2+
id: 64af2e2e-2309-4079-9c0f-985f1dd930f5
3+
version: 1.0.0
4+
description: |
5+
Identifies loading of the Vault client DLL by an unusual process. Adversaries can abuse the functions provided
6+
by the Credential Vault Client Library to enumerate or harvest saved credentials.
7+
labels:
8+
tactic.id: TA0006
9+
tactic.name: Credential Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
11+
technique.id: T1555
12+
technique.name: Credentials from Password Stores
13+
technique.ref: https://attack.mitre.org/techniques/T1555/
14+
subtechnique.id: T1555.004
15+
subtechnique.name: Windows Credential Manager
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1555/004/
17+
18+
references:
19+
- https://redcanary.com/blog/incident-response/active-breach-evading-defenses/
20+
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
21+
22+
condition: >
23+
sequence
24+
maxspan 2m
25+
|spawn_process and ps.exe != ''
26+
and
27+
not
28+
(
29+
ps.child.exe imatches
30+
(
31+
'?:\\Windows\\System32\\MDMAppInstaller.exe',
32+
'?:\\Windows\\uus\\*\\MoUsoCoreWorker.exe',
33+
'?:\\Windows\\Microsoft.NET\\Framework64\\*\\dfsvc.exe',
34+
'?:\\Windows\\Microsoft.NET\\Framework64\\*\\mscorsvw.exe',
35+
'?:\\Program Files\\*.exe',
36+
'?:\\Program Files (x86)\\*.exe',
37+
'?:\\Windows\\winsxs\\*\\TiWorker.exe'
38+
)
39+
or
40+
(ps.child.exe imatches '?:\\WINDOWS\\System32\\taskhostw.exe' and ps.args intersects ('-k', 'netsvcs', '-p', '-s', 'Schedule'))
41+
or
42+
(ps.child.exe imatches '?:\\Windows\\System32\\RuntimeBroker.exe')
43+
or
44+
(ps.exe imatches ('?:\\Program Files\\WindowsApps\\Microsoft.*.exe', '?:\\Windows\\Microsoft.NET\\Framework*\\NGenTask.exe'))
45+
or
46+
(ps.child.exe imatches '?:\\WINDOWS\\System32\\svchost.exe' and ps.child.args intersects ('-k', 'wusvcs', '-p', '-s', 'WaaSMedicSvc'))
47+
or
48+
(ps.child.exe imatches '?:\\WINDOWS\\System32\\svchost.exe' and ps.child.args intersects ('-k', 'netsvcs', '-p', '-s', 'TokenBroker'))
49+
or
50+
(ps.child.exe imatches '?:\\WINDOWS\\system32\\BackgroundTaskHost.exe' and ps.child.args not in ('-ServerName:BackgroundTaskHost.WebAccountProvider'))
51+
)
52+
| by ps.child.uuid
53+
|load_dll and image.name ~= 'vaultcli.dll'| by ps.uuid
54+
55+
output: >
56+
Suspicious process %2.ps.exe loaded the Credential Vault Client DLL for potential credentials harvesting
57+
severity: high
58+
59+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)