Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

Sigma rule (View on GitHub)

  1title: Suspicious SYSTEM User Process Creation
  2id: 2617e7ed-adb7-40ba-b0f3-8f9945fe6c09
  3status: test
  4description: Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)
  5references:
  6    - Internal Research
  7    - https://tools.thehacker.recipes/mimikatz/modules
  8author: Florian Roth (Nextron Systems), David ANDRE (additional keywords)
  9date: 2021-12-20
 10modified: 2024-11-11
 11tags:
 12    - attack.credential-access
 13    - attack.defense-evasion
 14    - attack.privilege-escalation
 15    - attack.t1134
 16    - attack.t1003
 17    - attack.t1027
 18logsource:
 19    category: process_creation
 20    product: windows
 21detection:
 22    selection:
 23        IntegrityLevel: System
 24        User|contains: # covers many language settings
 25            - 'AUTHORI'
 26            - 'AUTORI'
 27    selection_special:
 28        - Image|endswith:
 29              - '\calc.exe'
 30              - '\cscript.exe'
 31              - '\forfiles.exe'
 32              - '\hh.exe'
 33              - '\mshta.exe'
 34              - '\ping.exe'
 35              - '\wscript.exe'
 36        - CommandLine|contains:
 37              # - 'sc stop ' # stops a system service # causes FPs
 38              - ' -NoP '  # Often used in malicious PowerShell commands
 39              - ' -W Hidden '  # Often used in malicious PowerShell commands
 40              - ' -decode '  # Used with certutil
 41              - ' /decode '  # Used with certutil
 42              - ' /urlcache '  # Used with certutil
 43              - ' -urlcache '  # Used with certutil
 44              - ' -e* JAB'  # PowerShell encoded commands
 45              - ' -e* SUVYI'  # PowerShell encoded commands
 46              - ' -e* SQBFAFgA'  # PowerShell encoded commands
 47              - ' -e* aWV4I'  # PowerShell encoded commands
 48              - ' -e* IAB'  # PowerShell encoded commands
 49              - ' -e* PAA'  # PowerShell encoded commands
 50              - ' -e* aQBlAHgA'  # PowerShell encoded commands
 51              - 'vssadmin delete shadows'  # Ransomware
 52              - 'reg SAVE HKLM'  # save registry SAM - syskey extraction
 53              - ' -ma '  # ProcDump
 54              - 'Microsoft\Windows\CurrentVersion\Run'  # Run key in command line - often in combination with REG ADD
 55              - '.downloadstring('  # PowerShell download command
 56              - '.downloadfile('  # PowerShell download command
 57              - ' /ticket:'  # Rubeus
 58              - 'dpapi::'     # Mimikatz
 59              - 'event::clear'        # Mimikatz
 60              - 'event::drop'     # Mimikatz
 61              - 'id::modify'      # Mimikatz
 62              - 'kerberos::'       # Mimikatz
 63              - 'lsadump::'      # Mimikatz
 64              - 'misc::'     # Mimikatz
 65              - 'privilege::'       # Mimikatz
 66              - 'rpc::'      # Mimikatz
 67              - 'sekurlsa::'       # Mimikatz
 68              - 'sid::'        # Mimikatz
 69              - 'token::'      # Mimikatz
 70              - 'vault::cred'     # Mimikatz
 71              - 'vault::list'     # Mimikatz
 72              - ' p::d '  # Mimikatz
 73              - ';iex('  # PowerShell IEX
 74              - 'MiniDump'  # Process dumping method apart from procdump
 75              - 'net user '
 76    filter_main_ping:
 77        CommandLine|contains|all:
 78            - 'ping'
 79            - '127.0.0.1'
 80            - ' -n '
 81    filter_vs:
 82        Image|endswith: '\PING.EXE'
 83        ParentCommandLine|contains: '\DismFoDInstall.cmd'
 84    filter_config_mgr:
 85        ParentImage|contains: ':\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows\'
 86    filter_java:
 87        ParentImage|contains:
 88            - ':\Program Files (x86)\Java\'
 89            - ':\Program Files\Java\'
 90        ParentImage|endswith: '\bin\javaws.exe'
 91        Image|contains:
 92            - ':\Program Files (x86)\Java\'
 93            - ':\Program Files\Java\'
 94        Image|endswith: '\bin\jp2launcher.exe'
 95        CommandLine|contains: ' -ma '
 96    condition: all of selection* and not 1 of filter_*
 97falsepositives:
 98    - Administrative activity
 99    - Scripts and administrative tools used in the monitored environment
100    - Monitoring activity
101level: high

References

Related rules

to-top