Detectionhightest

BloodHound Collection Files

Detects default file names outputted by the BloodHound collection tool SharpHound

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
C.J. MayCreated Tue Aug 09Updated Thu Feb 1902773bed-83bf-469f-b7ff-e676e7d78babwindows
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event

Events for file system activity including creation, modification, and deletion.

Detection Logic
Detection Logic2 selectors
detection:
    selection:
        TargetFilename|endswith:
            - 'BloodHound.zip'
            - '_computers.json'
            - '_containers.json'
            # - '_domains.json'  # prone to false positives with ProbabilisticRevealTokenRegistry function in Google Chrome
            - '_gpos.json'
            - '_groups.json'
            - '_ous.json'
            - '_users.json'
    filter_optional_ms_winapps:
        Image|endswith: '\svchost.exe'
        TargetFilename|startswith: 'C:\Program Files\WindowsApps\Microsoft.'
        TargetFilename|endswith: '\pocket_containers.json'
    condition: selection and not 1 of filter_optional_*
False Positives

Some false positives may arise in some environment and this may require some tuning. Add additional filters or reduce level depending on the level of noise

Rule Metadata
Rule ID
02773bed-83bf-469f-b7ff-e676e7d78bab
Status
test
Level
high
Type
Detection
Created
Tue Aug 09
Modified
Thu Feb 19
Author
Path
rules/windows/file/file_event/file_event_win_bloodhound_collection.yml
Raw Tags
attack.discoveryattack.t1087.001attack.t1087.002attack.t1482attack.t1069.001attack.t1069.002attack.executionattack.t1059.001
View on GitHub