Enumeration for 3rd Party Creds From CLI

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects processes that query known 3rd party registry keys that holds credentials via commandline

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND COMMANDLINE contains "\Software\Aerofox\Foxmail\V3.1,\Software\Aerofox\FoxmailPreview,\Software\DownloadManager\Passwords,\Software\FTPWare\COREFTP\Sites,\Software\IncrediMail\Identities,\Software\Martin Prikryl\WinSCP 2\Sessions,\Software\Mobatek\MobaXterm\,\Software\OpenSSH\Agent\Keys,\Software\OpenVPN-GUI\configs,\Software\ORL\WinVNC3\Password,\Software\Qualcomm\Eudora\CommandLine,\Software\RealVNC\WinVNC4,\Software\RimArts\B2\Settings,\Software\SimonTatham\PuTTY\Sessions,\Software\SimonTatham\PuTTY\SshHostKeys\,\Software\Sota\FFFTP,\Software\TightVNC\Server,\Software\WOW6432Node\Radmin\v3.0\Server\Parameters\Radmin" AND (PROCESSNAME notendswith "reg.exe" OR COMMANDLINE notcontains "export,save") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems)