Microsoft Teams Sensitive File Access By Uncommon Applications
Detects file access attempts to sensitive Microsoft teams files (leveldb, cookies) by an uncommon process.
Sigma rule (View on GitHub)
1title: Microsoft Teams Sensitive File Access By Uncommon Applications
2id: 65744385-8541-44a6-8630-ffc824d7d4cc
3status: experimental
4description: |
5 Detects file access attempts to sensitive Microsoft teams files (leveldb, cookies) by an uncommon process.
6references:
7 - https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/
8 - https://www.vectra.ai/blog/undermining-microsoft-teams-security-by-mining-tokens
9author: '@SerkinValery'
10date: 2024-07-22
11tags:
12 - attack.credential-access
13 - attack.t1528
14logsource:
15 product: windows
16 category: file_access
17 definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'
18detection:
19 selection:
20 FileName|contains:
21 - '\Microsoft\Teams\Cookies'
22 - '\Microsoft\Teams\Local Storage\leveldb'
23 filter_main_legit_location:
24 # Note: its best to filter the full path to avoid false negatives
25 Image|endswith: '\Microsoft\Teams\current\Teams.exe'
26 condition: selection and not 1 of filter_main_*
27falsepositives:
28 - Unknown
29level: medium
References
Related rules
- Anomalous Token
- Anonymous IP Address
- App Granted Microsoft Permissions
- Application URI Configuration Changes
- Delegated Permissions Granted For All Users