Support needed for detection of creating new process using stolen access token T1134.002 #2147
Replies: 4 comments 10 replies
-
You want a detection create from the script? |
Beta Was this translation helpful? Give feedback.
-
The usual procedure to get to a rule is:
|
Beta Was this translation helpful? Give feedback.
-
just run some cmd for the help in a VM but not seem to work (no error or output) logsource:
product: windows
category: ps_module
definition: PowerShell Module Logging must be enabled
detection:
selection:
Payload|contains: 'Invoke-TokenManipulation'
condition: selection logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains: 'Invoke-TokenManipulation'
condition: selection |
Beta Was this translation helpful? Give feedback.
-
@Jackson-Pollock as you get the cmd.exe , don't you get any process_creation log for the cmd ? |
Beta Was this translation helpful? Give feedback.
-
Attack script: https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-TokenManipulation.ps1
Any idea how to detect token manipulation?
Beta Was this translation helpful? Give feedback.
All reactions