Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

Sigma rule (View on GitHub)

  1title: Suspicious SYSTEM User Process Creation
  2id: 2617e7ed-adb7-40ba-b0f3-8f9945fe6c09
  3status: test
  4description: Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)
  5references:
  6    - Internal Research
  7    - https://tools.thehacker.recipes/mimikatz/modules
  8author: Florian Roth (Nextron Systems), David ANDRE (additional keywords)
  9date: 2021-12-20
 10modified: 2024-12-01
 11tags:
 12    - attack.credential-access
 13    - attack.defense-evasion
 14    - attack.privilege-escalation
 15    - attack.t1134
 16    - attack.t1003
 17    - attack.t1027
 18logsource:
 19    category: process_creation
 20    product: windows
 21detection:
 22    selection:
 23        IntegrityLevel:
 24            - 'System'
 25            - 'S-1-16-16384'
 26        User|contains: # covers many language settings
 27            - 'AUTHORI'
 28            - 'AUTORI'
 29    selection_special:
 30        - Image|endswith:
 31              - '\calc.exe'
 32              - '\cscript.exe'
 33              - '\forfiles.exe'
 34              - '\hh.exe'
 35              - '\mshta.exe'
 36              - '\ping.exe'
 37              - '\wscript.exe'
 38        - CommandLine|contains:
 39              # - 'sc stop ' # stops a system service # causes FPs
 40              - ' -NoP '  # Often used in malicious PowerShell commands
 41              - ' -W Hidden '  # Often used in malicious PowerShell commands
 42              - ' -decode '  # Used with certutil
 43              - ' /decode '  # Used with certutil
 44              - ' /urlcache '  # Used with certutil
 45              - ' -urlcache '  # Used with certutil
 46              - ' -e* JAB'  # PowerShell encoded commands
 47              - ' -e* SUVYI'  # PowerShell encoded commands
 48              - ' -e* SQBFAFgA'  # PowerShell encoded commands
 49              - ' -e* aWV4I'  # PowerShell encoded commands
 50              - ' -e* IAB'  # PowerShell encoded commands
 51              - ' -e* PAA'  # PowerShell encoded commands
 52              - ' -e* aQBlAHgA'  # PowerShell encoded commands
 53              - 'vssadmin delete shadows'  # Ransomware
 54              - 'reg SAVE HKLM'  # save registry SAM - syskey extraction
 55              - ' -ma '  # ProcDump
 56              - 'Microsoft\Windows\CurrentVersion\Run'  # Run key in command line - often in combination with REG ADD
 57              - '.downloadstring('  # PowerShell download command
 58              - '.downloadfile('  # PowerShell download command
 59              - ' /ticket:'  # Rubeus
 60              - 'dpapi::'     # Mimikatz
 61              - 'event::clear'        # Mimikatz
 62              - 'event::drop'     # Mimikatz
 63              - 'id::modify'      # Mimikatz
 64              - 'kerberos::'       # Mimikatz
 65              - 'lsadump::'      # Mimikatz
 66              - 'misc::'     # Mimikatz
 67              - 'privilege::'       # Mimikatz
 68              - 'rpc::'      # Mimikatz
 69              - 'sekurlsa::'       # Mimikatz
 70              - 'sid::'        # Mimikatz
 71              - 'token::'      # Mimikatz
 72              - 'vault::cred'     # Mimikatz
 73              - 'vault::list'     # Mimikatz
 74              - ' p::d '  # Mimikatz
 75              - ';iex('  # PowerShell IEX
 76              - 'MiniDump'  # Process dumping method apart from procdump
 77              - 'net user '
 78    filter_main_ping:
 79        CommandLine|contains|all:
 80            - 'ping'
 81            - '127.0.0.1'
 82            - ' -n '
 83    filter_vs:
 84        Image|endswith: '\PING.EXE'
 85        ParentCommandLine|contains: '\DismFoDInstall.cmd'
 86    filter_config_mgr:
 87        ParentImage|contains: ':\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows\'
 88    filter_java:
 89        ParentImage|contains:
 90            - ':\Program Files (x86)\Java\'
 91            - ':\Program Files\Java\'
 92        ParentImage|endswith: '\bin\javaws.exe'
 93        Image|contains:
 94            - ':\Program Files (x86)\Java\'
 95            - ':\Program Files\Java\'
 96        Image|endswith: '\bin\jp2launcher.exe'
 97        CommandLine|contains: ' -ma '
 98    condition: all of selection* and not 1 of filter_*
 99falsepositives:
100    - Administrative activity
101    - Scripts and administrative tools used in the monitored environment
102    - Monitoring activity
103level: high

References

Related rules

to-top