heroui logo

Possible Browser Pass View Parameter

Splunk Security Content

View Source
Summary
This detection rule identifies potential malicious activities related to credential dumping from web browsers, specifically focusing on behaviors typical of Remcos RAT malware. The rule monitors command-line parameters of processes associated with known credential dumping tools, utilizing data obtained from Endpoint Detection and Response (EDR) systems. The detection relies on Sysmon EventID 1 and Windows Event Log Security 4688 to capture relevant process execution data. If such command-line parameters are detected in conjunction with suspicious file paths, it will signal possible unauthorized access to web credentials, which is a significant threat in the landscape of cyber espionage. The implementation requires accurate ingestion of command-line execution logs to ensure detection effectiveness.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Script
  • Process
ATT&CK Techniques
  • T1555.003
  • T1555
Created: 2024-11-13