heroui logo

Detect SharpHound File Modifications

Splunk Security Content

View Source
Summary
This detection rule identifies the creation of files typically associated with SharpHound, a tool used for reconnaissance in Active Directory environments, particularly for gathering domain and trust data. It ingests data from the Endpoint.Filesystem data model, specifically monitoring file modification events for known file naming conventions indicating potential malicious activity, such as '*_BloodHound.zip' and several JSON files commonly used by SharpHound. Detection of these files can suggest an attacker is conducting domain enumeration, a step that can facilitate lateral movement and privilege escalation within an organization. This rule leverages Sysmon EventID 11 to capture relevant file creation events and provides a mechanism to identify and respond to potential threats before they result in significant damage.
Categories
  • Endpoint
  • Windows
  • On-Premise
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • File
  • Process
ATT&CK Techniques
  • T1059.001
  • T1087.002
  • T1069.001
  • T1482
  • T1087.001
  • T1087
  • T1069.002
  • T1069
Created: 2024-11-13