Execution of ZeroLogon PoC executable

Detects the execution of the commonly used ZeroLogon PoC executable.

Sigma rule (View on GitHub)

 1title: Execution of ZeroLogon PoC executable
 2id: dcc6a01e-9471-44a0-a699-71ea96f8ed8b
 3status: Experimental
 4description: Detects the execution of the commonly used ZeroLogon PoC executable.
 5author: '@Kostastsale, @TheDFIRReport'
 6references:
 7  - https://thedfirreport.com/2021/11/01/from-zero-to-domain-admin/
 8  - https://thedfirreport.com/2022/02/21/qbot-and-zerologon-lead-to-full-domain-compromise/
 9date: 2022/02/12
10logsource:
11  product: windows
12  category: process_creation
13detection:
14  selection1:
15    ParentImage|endswith:
16      - '\cmd.exe'
17    Image|endswith:
18      - '\cool.exe'
19      - '\zero.exe'
20    CommandLine|contains|all:
21      - 'Administrator'
22      - '-c'
23  selection2:
24    CommandLine|contains|all:
25      - 'taskkill'
26      - '/f'
27      - '/im'
28  selection3:
29    CommandLine|contains:
30      - 'powershell'
31  condition: selection1 and (selection2 or selection3)
32falsepositives:
33  - Uknown
34level: high
35tags:
36  - attack.execution
37  - attack.lateral_movement
38  - attack.T1210```

References

Related rules

to-top