Skip to content

Latest commit

 

History

History
17 lines (15 loc) · 13.8 KB

r_m_beyondtrust_beyondtrust_Privilege_Escalation.md

File metadata and controls

17 lines (15 loc) · 13.8 KB

Rules by Product and UseCase

Vendor: BeyondTrust

Product: BeyondTrust

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
60 14 44 4 3
Event Type Rules Models
account-switch T1078 - Valid Accounts
AS-UA-A: Abnormal switch to target account for user
AS-UA-F-PRIV: Account switch to a privileged or executive account
AS-UA-FS: First account switch for user
DC18-New: New account switch to privileged account

T1555.005 - T1555.005
AS-PV-OU-F: First password retrieval activity for user in organization
AS-PV-OG-F: First password retrieval activity for user in peer group
AS-PV-US-F: First password retrieval using this safe value for user
AS-PV-US-A: Abnormal password retrieval using this safe value for user
AS-PV-UT-A: Abnormal user Password retrieval activity time
AS-PV-UsH-F: First password retrieval from asset for user
AS-PV-UsH: Source Hosts using password retrieval accounts for user
AS-PV-UT-TOW: Password retrieval activity time for user
AS-PV-US: Safe values for user
AS-PV-OG: Password retrieval activity for users in the peer group
AS-PV-OU: Password retrieval activity for users in the organization
AS-UA: Target credentials for user
app-activity T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
EM-InB-Ex: A user has been given mailbox permissions for an executive user
EM-InB-Perm-N-F: First time a user has given mailbox permissions on another mailbox that is not their own
EM-InB-Perm-N-A: Abnormal for user to give mailbox permissions
EM-InB-Perm-N: Models users who give mailbox permissions
local-logon T1078 - Valid Accounts
AS-PV-UHWoPC: Access to Password Vault managed asset with no password checkout for user
DC18-new: Account switch by new user

T1555.005 - T1555.005
AS-PV-UHWoPC: Access to Password Vault managed asset with no password checkout for user
AS-PV-OA: Password retrieval based accounts
process-created T1012 - Query Registry
ATP-REG-Password: Scanning registry hives via Reg Utility
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-EPA-REG-Query-F: First execution of process with req query arguments for windows policies on this asset
A-EPA-REG-Query-A: Abnormal execution of process with req query arguments for windows policies on this asset

T1059.001 - Command and Scripting Interperter: PowerShell
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
A-Powershell-Exec-DLL: PowerShell Strings applied to rundllas.exe seen in PowerShdll.dll on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-EPA-DLL: Dll loaded from a temp folder via PowerShell on this asset

T1218.011 - Signed Binary Proxy Execution: Rundll32
A-RunDll32-ControlPanel: RunDll32.exe run from the control panel on this asset
A-Powershell-Exec-DLL: PowerShell Strings applied to rundllas.exe seen in PowerShdll.dll on this asset.
A-EPA-DLL: Dll loaded from a temp folder via PowerShell on this asset

T1218.003 - Signed Binary Proxy Execution: CMSTP
A-UAC-Bypass-COM-OBJECT: Windows UAC bypass using COM object access on this asset
A-Bypass-UAC-CMSTP: Child process of automatically elevated instance of Microsoft Connection Manager Profile Installer (cmstp.exe) was created via command line on this asset.

T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control
A-UAC-Bypass-COM-OBJECT: Windows UAC bypass using COM object access on this asset
A-UAC-Bypass-Fodhelper: UAC Bypass using fodhelper.exe on this asset
A-UAC-Bypass-Wsreset: UAC Bypass using wsreset.exe on this asset
A-Bypass-UAC-CMSTP: Child process of automatically elevated instance of Microsoft Connection Manager Profile Installer (cmstp.exe) was created via command line on this asset.

T1027 - Obfuscated Files or Information
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1036.004 - T1036.004
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1059.003 - T1059.003
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1033 - System Owner/User Discovery
A-WHOAMI-SYSTEM: Whoami commanded executed by LOCAL SYSTEM
A-AccountDiscovery: Local accounts were enumerated on this asset

T1087.001 - Account Discovery: Local Account
EPA-OU-CENUM-F: First user running credential enumeration tool
EPA-OU-CENUM-A: Abnormal for this user to run credential enumeration tool
A-EPA-OH-CENUM-F: Asset running credential enumeration tool for the first time
A-EPA-OH-CENUM-A: Abnormal for this asset to run credential enumeration tool
A-AccountDiscovery: Local accounts were enumerated on this asset

T1082 - System Information Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool
A-NET-EXE-Recon: Enumeration and reconnaissance activities were performed on this asset

T1087 - Account Discovery
A-NET-EXE-Recon: Enumeration and reconnaissance activities were performed on this asset

T1482 - Domain Trust Discovery
A-DomainTrust-Discovery: Enumeration of Windows Domain Trusts identified on this asset

T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification
A-File-Folder-Perm-Mod: The permissions of a file or folder were modified on this asset.

T1574.002 - Hijack Execution Flow: DLL Side-Loading
PlugX-DLL-Sideloading: DLL loaded from suspicous location typically seen by the PlugX malware family
A-Sus-GUP-Usage: Execution of the Notepad++ updater in a suspicious directory on this asset.

T1218.002 - Signed Binary Proxy Execution: Control Panel
A-RunDll32-ControlPanel: RunDll32.exe run from the control panel on this asset

T1218.010 - Signed Binary Proxy Execution: Regsvr32
A-DLL-AppData: DLL loaded from 'AppData(slash)Local' path on this asset

T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
A-POSS-SPN-ENUMERATION: Possible SPN Enumeration on this asset

T1003 - OS Credential Dumping
A-ShadowCP-SymLink: Shadow Copies Access via Symlink on this asset

T1543.003 - Create or Modify System Process: Windows Service
A-New-Service: New windows service created using sc.exe on this asset

T1053.005 - Scheduled Task/Job: Scheduled Task
A-PrivEsc-SchedTask-LegacyDACL: Possible privilege escalation using a legacy task file on this asset

T1574.011 - T1574.011
A-Possible-PrivEsc-SvcPerms: Possible privilege escalation using weak service permissions on this asset

T1134.002 - T1134.002
Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem
A-Network-Local-Service-System: SYSTEM process spawned by LOCAL or NETWORK service

T1053.002 - Scheduled Task/Job: At (Windows)
A-INTERACTIVE-JOB: Interactive job from the 'at' program seen on this asset

T1068 - Exploitation for Privilege Escalation
A-UAC-IE-INVOKE: Windows UAC consent dialogue was used to invoke an Internet Explorer process running as Local SYSTEM
A-APT-Hurricane-Panda: Artifacts used by the APT group 'Hurricane Panda' have been observed on this asset
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset

T1574 - Hijack Execution Flow
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset

T1087.002 - Account Discovery: Domain Account
EPA-OU-CENUM-F: First user running credential enumeration tool
EPA-OU-CENUM-A: Abnormal for this user to run credential enumeration tool
A-EPA-OH-CENUM-F: Asset running credential enumeration tool for the first time
A-EPA-OH-CENUM-A: Abnormal for this asset to run credential enumeration tool

T1007 - System Service Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1018 - Remote System Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1049 - System Network Connections Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1057 - Process Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1135 - Network Share Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1047 - Windows Management Instrumentation
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1518.001 - T1518.001
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1547.002 - T1547.002
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27

T1027.004 - Obfuscated Files or Information: Compile After Delivery
CSC-Suspicious-Folder: Csc.exe spawned from suspicious folder

T1484.001 - T1484.001
OG-SYSVOL-F: Suspicious SYSVOL Domain Group Policy Access for the first time for this peer group
OG-SYSVOL-A: Abnormal SYSVOL Domain Group Policy Access for thjis peer group

T1552.006 - T1552.006
OG-SYSVOL-F: Suspicious SYSVOL Domain Group Policy Access for the first time for this peer group
OG-SYSVOL-A: Abnormal SYSVOL Domain Group Policy Access for thjis peer group

T1134.001 - Access Token Manipulation: Token Impersonation/Theft
Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem

T1016 - System Network Configuration Discovery
WINCMD-Arp: 'Arp' program used
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
A-EPA-REG-WU: Models reg query activity for windows update on the assets.
A-EPA-OH-CENUM: Assets on which credential enumeration tools are run
A-EPA-OH-HENUM: Assets on which host enumeration tools are run
EPA-OG-SYSVOL: SYSVOL domain group policy access by group in the organization
EPA-OU-CENUM: Users running credential enumeration tools
EPA-OU-HENUM: Users running host enumeration tools