heroui logo

HackTool - Potential Remote Credential Dumping Activity Via CrackMapExec Or Impacket-Secretsdump

Sigma Rules

View Source
Summary
This detection rule targets potential credential dumping activities that utilize tools such as CrackMapExec and Impacket's secretsdump. These tools are known for performing illicit actions against Windows endpoints, particularly for gathering Windows account credentials. Specifically, the rule looks for executions of processes named 'svchost.exe' that produce output files with default temporary filenames within the System32 directory. These filenames typically indicate suspicious activity associated with credential harvesting, as they often conform to a certain naming pattern (eight alphanumeric characters followed by a '.tmp' extension). The rule also incorporates a high severity level, suggesting the importance of monitoring such events closely to proactively respond to potential intrusions.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2022-11-16