Support needed for detection of creating new process using stolen access token T1134.002 #2147
Replies: 4 comments 10 replies
-
|
You want a detection create from the script? |
Beta Was this translation helpful? Give feedback.
-
|
The usual procedure to get to a rule is:
|
Beta Was this translation helpful? Give feedback.
-
|
just run some cmd for the help in a VM but not seem to work (no error or output) logsource:
product: windows
category: ps_module
definition: PowerShell Module Logging must be enabled
detection:
selection:
Payload|contains: 'Invoke-TokenManipulation'
condition: selectionlogsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains: 'Invoke-TokenManipulation'
condition: selection |
Beta Was this translation helpful? Give feedback.
-
|
@Jackson-Pollock as you get the cmd.exe , don't you get any process_creation log for the cmd ? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Attack script: https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-TokenManipulation.ps1
Any idea how to detect token manipulation?
Beta Was this translation helpful? Give feedback.
All reactions