Access To Browser Credential Files By Uncommon Application
Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage
Sigma rule (View on GitHub)
1title: Access To Browser Credential Files By Uncommon Application
2id: 91cb43db-302a-47e3-b3c8-7ede481e27bf
3status: experimental
4description: |
5 Detects file access requests to browser credential stores by uncommon processes.
6 Could indicate potential attempt of credential stealing.
7 Requires heavy baselining before usage
8references:
9 - https://www.zscaler.com/blogs/security-research/ffdroider-stealer-targeting-social-media-platform-users
10 - https://github.com/lclevy/firepwd
11author: frack113
12date: 2022/04/09
13modified: 2023/09/15
14tags:
15 - attack.t1003
16 - attack.credential_access
17logsource:
18 category: file_access
19 product: windows
20 definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'
21detection:
22 selection_ie:
23 FileName|endswith: '\Appdata\Local\Microsoft\Windows\WebCache\WebCacheV01.dat'
24 selection_firefox:
25 FileName|endswith:
26 - '\cookies.sqlite'
27 - 'release\key3.db' # Firefox
28 - 'release\key4.db' # Firefox
29 - 'release\logins.json' # Firefox
30 selection_chromium:
31 FileName|contains:
32 - '\Appdata\Local\Chrome\User Data\Default\Login Data'
33 - '\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies'
34 - '\AppData\Local\Google\Chrome\User Data\Local State'
35 filter_main_system:
36 Image: System
37 ParentImage: Idle
38 filter_main_generic:
39 # This filter is added to avoid large ammount of FP with 3rd party software. You could remove this in favour of specific filter per-application
40 Image|startswith:
41 - 'C:\Program Files\'
42 - 'C:\Program Files (x86)\'
43 - 'C:\WINDOWS\system32\'
44 - 'C:\WINDOWS\SysWOW64\'
45 filter_optional_defender:
46 Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\'
47 Image|endswith:
48 - '\MpCopyAccelerator.exe'
49 - '\MsMpEng.exe'
50 filter_optional_thor:
51 Image|endswith:
52 - '\thor64.exe'
53 - '\thor.exe'
54 filter_optional_msiexec:
55 ParentImage: 'C:\Windows\System32\msiexec.exe'
56 condition: 1 of selection_* and not 1 of filter_main_* and not 1 of filter_optional_*
57falsepositives:
58 - Antivirus, Anti-Spyware, Anti-Malware Software
59 - Backup software
60 - Legitimate software installed on partitions other than "C:\"
61 - Searching software such as "everything.exe"
62level: low
References
Related rules
- Credential Manager Access By Uncommon Application
- Potential Credential Dumping Via LSASS Process Clone
- Possible Impacket Secretsdump.py Activity
- Suspicious Hacktool Execution - Imphash
- Suspicious Hacktool Execution - PE Metadata