DPAPI Backup Keys And Certificate Export Activity IOC
Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.
Sigma rule (View on GitHub)
1title: DPAPI Backup Keys And Certificate Export Activity IOC
2id: 7892ec59-c5bb-496d-8968-e5d210ca3ac4
3status: test
4description: |
5 Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.
6references:
7 - https://www.dsinternals.com/en/dpapi-backup-key-theft-auditing/
8 - https://github.com/MichaelGrafnetter/DSInternals/blob/39ee8a69bbdc1cfd12c9afdd7513b4788c4895d4/Src/DSInternals.Common/Data/DPAPI/DPAPIBackupKey.cs#L28-L32
9author: Nounou Mbeiri, Nasreddine Bencherchali (Nextron Systems)
10date: 2024-06-26
11tags:
12 - attack.credential-access
13 - attack.t1555
14 - attack.t1552.004
15logsource:
16 product: windows
17 category: file_event
18detection:
19 selection:
20 TargetFilename|contains:
21 - 'ntds_capi_'
22 - 'ntds_legacy_'
23 - 'ntds_unknown_'
24 TargetFilename|endswith:
25 - '.cer'
26 - '.key'
27 - '.pfx'
28 - '.pvk'
29 condition: selection
30falsepositives:
31 - Unlikely
32level: high
References
Related rules
- HackTool - WinPwn Execution
- HackTool - WinPwn Execution - ScriptBlock
- Certificate Exported Via PowerShell
- Certificate Exported Via PowerShell - ScriptBlock
- Cisco Crypto Commands