Copy from Admin Share

Detects a suspicious copy command to or from an Admin share or remote

Sigma rule (View on GitHub)

 1title: Copy from Admin Share
 2id: 855bc8b5-2ae8-402e-a9ed-b889e6df1900
 3status: test
 4description: Detects a suspicious copy command to or from an Admin share or remote
 5references:
 6    - https://twitter.com/SBousseaden/status/1211636381086339073
 7    - https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view
 8    - https://www.elastic.co/guide/en/security/current/remote-file-copy-to-a-hidden-share.html
 9    - https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/
10author: Florian Roth (Nextron Systems), oscd.community, Teymur Kheirkhabarov @HeirhabarovT, Zach Stanford @svch0st, Nasreddine Bencherchali
11date: 2019/12/30
12modified: 2023/02/02
13tags:
14    - attack.lateral_movement
15    - attack.collection
16    - attack.exfiltration
17    - attack.t1039
18    - attack.t1048
19    - attack.t1021.002
20logsource:
21    category: process_creation
22    product: windows
23detection:
24    selection_other_tools:
25        - Image|endswith:
26            - '\robocopy.exe'
27            - '\xcopy.exe'
28        - OriginalFileName:
29            - 'robocopy.exe'
30            - 'XCOPY.EXE'
31    selection_cmd_img:
32        - Image|endswith: '\cmd.exe'
33        - OriginalFileName: 'Cmd.Exe'
34    selection_cmd_cli:
35        CommandLine|contains: 'copy'
36    selection_pwsh_img:
37        - Image|contains:
38            - '\powershell.exe'
39            - '\pwsh.exe'
40        - OriginalFileName:
41            - 'PowerShell.EXE'
42            - 'pwsh.dll'
43    selection_pwsh_cli:
44        CommandLine|contains:
45            - 'copy-item'
46            - 'copy '
47            - 'cpi '
48            - ' cp '
49            - 'move '
50            - 'move-item'
51            - ' mi '
52            - ' mv '
53    selection_target:
54        - CommandLine|contains|all:
55            - '\\\\'
56            - '$'
57        - CommandLine|contains: '\Sysvol\'
58    condition: selection_target and (selection_other_tools or all of selection_cmd_* or all of selection_pwsh_*)
59falsepositives:
60    - Administrative scripts
61level: high

References

Related rules

to-top