Potentially Suspicious JWT Token Search Via CLI
Detects possible search for JWT tokens via CLI by looking for the string "eyJ0eX" or "eyJhbG". This string is used as an anchor to look for the start of the JWT token used by microsoft office and similar apps.
Sigma rule (View on GitHub)
1title: Potentially Suspicious JWT Token Search Via CLI
2id: 6d3a3952-6530-44a3-8554-cf17c116c615
3status: test
4description: |
5 Detects possible search for JWT tokens via CLI by looking for the string "eyJ0eX" or "eyJhbG".
6 This string is used as an anchor to look for the start of the JWT token used by microsoft office and similar apps.
7references:
8 - https://mrd0x.com/stealing-tokens-from-office-applications/
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022-10-25
11modified: 2024-10-06
12tags:
13 - attack.credential-access
14 - attack.t1528
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection:
20 CommandLine|contains:
21 - 'eyJ0eXAiOi' # {"typ":
22 - 'eyJhbGciOi' # {"alg":
23 - ' eyJ0eX'
24 - ' "eyJ0eX"'
25 - " 'eyJ0eX'"
26 - ' eyJhbG'
27 - ' "eyJhbG"'
28 - " 'eyJhbG'"
29 condition: selection
30falsepositives:
31 - Unknown
32level: medium
References
Related rules
- Anomalous Token
- Anonymous IP Address
- App Granted Microsoft Permissions
- Application URI Configuration Changes
- Delegated Permissions Granted For All Users