DPAPI Backup Keys And Certificate Export Activity IOC

Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.

Sigma rule (View on GitHub)

 1title: DPAPI Backup Keys And Certificate Export Activity IOC
 2id: 7892ec59-c5bb-496d-8968-e5d210ca3ac4
 3status: test
 4description: |
 5        Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.
 6references:
 7    - https://www.dsinternals.com/en/dpapi-backup-key-theft-auditing/
 8    - https://github.com/MichaelGrafnetter/DSInternals/blob/39ee8a69bbdc1cfd12c9afdd7513b4788c4895d4/Src/DSInternals.Common/Data/DPAPI/DPAPIBackupKey.cs#L28-L32
 9author: Nounou Mbeiri, Nasreddine Bencherchali (Nextron Systems)
10date: 2024-06-26
11tags:
12    - attack.credential-access
13    - attack.t1555
14    - attack.t1552.004
15logsource:
16    product: windows
17    category: file_event
18detection:
19    selection:
20        TargetFilename|contains:
21            - 'ntds_capi_'
22            - 'ntds_legacy_'
23            - 'ntds_unknown_'
24        TargetFilename|endswith:
25            - '.cer'
26            - '.key'
27            - '.pfx'
28            - '.pvk'
29    condition: selection
30falsepositives:
31    - Unlikely
32level: high

References

Related rules

to-top