Weak or Abused Passwords In CLI
Detects weak passwords or often abused passwords (seen used by threat actors) via the CLI. An example would be a threat actor creating a new user via the net command and providing the password inline
Sigma rule (View on GitHub)
1title: Weak or Abused Passwords In CLI
2id: 91edcfb1-2529-4ac2-9ecc-7617f895c7e4
3status: test
4description: Detects weak passwords or often abused passwords (seen used by threat actors) via the CLI. An example would be a threat actor creating a new user via the net command and providing the password inline
5references:
6 - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments
7 - https://thedfirreport.com/2022/09/26/bumblebee-round-two/
8 - https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022/09/14
11modified: 2022/11/06
12tags:
13 - attack.defense_evasion
14 - attack.execution
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection:
20 CommandLine|contains:
21 # Add more passwords
22 - 'Asd123.aaaa'
23 - 'password123' # Also covers PASSWORD123123! as seen in https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/
24 - '123456789'
25 - 'P@ssw0rd!'
26 - 'Decryptme'
27 condition: selection
28falsepositives:
29 - Legitimate usage of the passwords by users via commandline (should be discouraged)
30 - Other currently unknown false positives
31level: medium
References
Related rules
- ImagingDevices Unusual Parent/Child Processes
- Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell
- Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell Module
- Invoke-Obfuscation Via Use MSHTA - PowerShell Module
- Lolbin Defaultpack.exe Use As Proxy