Potential Persistence Via Security Descriptors - ScriptBlock

Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.

Sigma rule (View on GitHub)

 1title: Potential Persistence Via Security Descriptors - ScriptBlock
 2id: 2f77047c-e6e9-4c11-b088-a3de399524cd
 3status: test
 4description: Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.
 5references:
 6    - https://github.com/HarmJ0y/DAMP
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023/01/05
 9tags:
10    - attack.persistence
11    - attack.defense_evasion
12    - attack.privilege_escalation
13logsource:
14    product: windows
15    category: ps_script
16    definition: 'Requirements: Script Block Logging must be enabled'
17detection:
18    selection:
19        ScriptBlockText|contains|all:
20            - 'win32_Trustee'
21            - 'win32_Ace'
22            - '.AccessMask'
23            - '.AceType'
24            - '.SetSecurityDescriptor'
25        ScriptBlockText|contains:
26            - '\Lsa\JD'
27            - '\Lsa\Skew1'
28            - '\Lsa\Data'
29            - '\Lsa\GBG'
30    condition: selection
31falsepositives:
32    - Unknown
33level: high

References

Related rules

to-top