DPAPI Backup Keys And Certificate Export Activity IOC

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "File Created or Modified" AND (FILENAME contains "ntds_capi_,ntds_legacy_,ntds_unknown_" OR OBJECTNAME contains "ntds_capi_,ntds_legacy_,ntds_unknown_") AND (FILENAME endswith ".cer,.key,.pfx,.pvk" OR OBJECTNAME endswith ".cer,.key,.pfx,.pvk") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

Nounou Mbeiri, Nasreddine Bencherchali (Nextron Systems)