
Summary
The 'HackTool - SharpDPAPI Execution' rule is designed to detect the execution of the SharpDPAPI tool, a C# implementation of Data Protection API (DPAPI) functionalities originating from Mimikatz. It utilizes multiple detection criteria, including both the command-line invocation of the tool and its executable file metadata. The detection logic incorporates checks for the presence of specific arguments that SharpDPAPI might use, indicating potentially malicious activity related to credential management and persistence. The rule is focused on the execution context within Windows environments, typically monitoring process creation events to identify suspicious usage of the SharpDPAPI tool.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2024-06-26