Enumeration for 3rd Party Creds From CLI
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects processes that query known 3rd party registry keys that holds credentials via commandline
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Process started" AND COMMANDLINE contains "\Software\Aerofox\Foxmail\V3.1,\Software\Aerofox\FoxmailPreview,\Software\DownloadManager\Passwords,\Software\FTPWare\COREFTP\Sites,\Software\IncrediMail\Identities,\Software\Martin Prikryl\WinSCP 2\Sessions,\Software\Mobatek\MobaXterm\,\Software\OpenSSH\Agent\Keys,\Software\OpenVPN-GUI\configs,\Software\ORL\WinVNC3\Password,\Software\Qualcomm\Eudora\CommandLine,\Software\RealVNC\WinVNC4,\Software\RimArts\B2\Settings,\Software\SimonTatham\PuTTY\Sessions,\Software\SimonTatham\PuTTY\SshHostKeys\,\Software\Sota\FFFTP,\Software\TightVNC\Server,\Software\WOW6432Node\Radmin\v3.0\Server\Parameters\Radmin" AND (PROCESSNAME notendswith "reg.exe" OR COMMANDLINE notcontains "export,save") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Nasreddine Bencherchali (Nextron Systems)


