
Summary
This detection rule monitors the execution of SharpHound command-line arguments, specifically targeting `-collectionMethod` and `invoke-bloodhound`. SharpHound is part of the BloodHound toolkit, used for Active Directory enumeration, which can facilitate lateral movement and privilege escalation by attackers. The rule utilizes data from Endpoint Detection and Response (EDR) agents, examining processes and command-line executions to identify potentially malicious behaviors linked to network mapping and target identification. By monitoring for these specific command-line arguments, the detection aims to flag significant security incidents that could lead to further cyber threats.
Categories
- Windows
- Endpoint
- Cloud
Data Sources
- Windows Registry
- Sensor Health
- Process
- Application Log
ATT&CK Techniques
- T1059.001
- T1087.002
- T1069.001
- T1482
- T1087.001
- T1087
- T1069.002
- T1069
Created: 2024-11-13