MITRE BZAR Indicators for Execution
Windows DCE-RPC functions which indicate an execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE
Sigma rule (View on GitHub)
1title: MITRE BZAR Indicators for Execution
2id: b640c0b8-87f8-4daa-aef8-95a24261dd1d
3status: test
4description: 'Windows DCE-RPC functions which indicate an execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE'
5references:
6 - https://github.com/mitre-attack/bzar#indicators-for-attck-execution
7author: '@neu5ron, SOC Prime'
8date: 2020-03-19
9modified: 2021-11-27
10tags:
11 - attack.execution
12 - attack.t1047
13 - attack.t1053.002
14 - attack.t1569.002
15logsource:
16 product: zeek
17 service: dce_rpc
18detection:
19 op1:
20 endpoint: 'JobAdd'
21 operation: 'atsvc'
22 op2:
23 endpoint: 'ITaskSchedulerService'
24 operation: 'SchRpcEnableTask'
25 op3:
26 endpoint: 'ITaskSchedulerService'
27 operation: 'SchRpcRegisterTask'
28 op4:
29 endpoint: 'ITaskSchedulerService'
30 operation: 'SchRpcRun'
31 op5:
32 endpoint: 'IWbemServices'
33 operation: 'ExecMethod'
34 op6:
35 endpoint: 'IWbemServices'
36 operation: 'ExecMethodAsync'
37 op7:
38 endpoint: 'svcctl'
39 operation: 'CreateServiceA'
40 op8:
41 endpoint: 'svcctl'
42 operation: 'CreateServiceW'
43 op9:
44 endpoint: 'svcctl'
45 operation: 'StartServiceA'
46 op10:
47 endpoint: 'svcctl'
48 operation: 'StartServiceW'
49 condition: 1 of op*
50falsepositives:
51 - Windows administrator tasks or troubleshooting
52 - Windows management scripts or software
53level: medium
References
Related rules
- PSExec and WMI Process Creations Block
- Application Removed Via Wmic.EXE
- Application Terminated Via Wmic.EXE
- Blue Mockingbird
- Blue Mockingbird - Registry