Detectionhightest
BloodHound Collection Files
Detects default file names outputted by the BloodHound collection tool SharpHound
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event
Events for file system activity including creation, modification, and deletion.
Detection Logic
Detection Logic2 selectors
detection:
selection:
TargetFilename|endswith:
- 'BloodHound.zip'
- '_computers.json'
- '_containers.json'
# - '_domains.json' # prone to false positives with ProbabilisticRevealTokenRegistry function in Google Chrome
- '_gpos.json'
- '_groups.json'
- '_ous.json'
- '_users.json'
filter_optional_ms_winapps:
Image|endswith: '\svchost.exe'
TargetFilename|startswith: 'C:\Program Files\WindowsApps\Microsoft.'
TargetFilename|endswith: '\pocket_containers.json'
condition: selection and not 1 of filter_optional_*False Positives
Some false positives may arise in some environment and this may require some tuning. Add additional filters or reduce level depending on the level of noise
References
MITRE ATT&CK
Rule Metadata
Rule ID
02773bed-83bf-469f-b7ff-e676e7d78bab
Status
test
Level
high
Type
Detection
Created
Tue Aug 09
Modified
Thu Feb 19
Author
Path
rules/windows/file/file_event/file_event_win_bloodhound_collection.yml
Raw Tags
attack.discoveryattack.t1087.001attack.t1087.002attack.t1482attack.t1069.001attack.t1069.002attack.executionattack.t1059.001