heroui logo

Suspicious Process Patterns NTDS.DIT Exfil

Sigma Rules

View Source
Summary
This rule is designed to detect potentially malicious process patterns associated with the exfiltration of the NTDS.DIT file, which contains Active Directory database information, including user credentials. The detection logic incorporates multiple selection criteria focusing on process creation in Windows environments that hint at suspicious activity involving NTDS.DIT. Key indicators include the use of known tools like NTDSDump and NTDSDumpEx, command-line arguments that reference 'ntds.dit' and 'system.hiv', and PowerShell usage aimed at manipulating or copying the NTDS.DIT file. The rule allows for flexibility in detecting both specific tools and broader patterns that suggest the file is being unlawfully accessed or transferred, flagging such behavior as high severity due to its potential impact on credential security in an Active Directory environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2022-03-11