Add more Mimikatz detection, focusing on token::elevate as a non-admin user

This commit is contained in:
Joshua Wright
2019-05-03 06:33:20 -04:00
parent f17d32491e
commit 9a293b974e
2 changed files with 21 additions and 0 deletions

View File

@ -136,6 +136,27 @@ function Main {
#$adminlogons.Set_Item($username,$securitysid)
#$adminlogons($username)+=($securitysid)
}
# This unique privilege list is used by Mimikatz 2.2.0
If ($privileges -Match "SeAssignPrimaryTokenPrivilege" `
-And $privileges -Match "SeTcbPrivilege" `
-And $privileges -Match "SeSecurityPrivilege" `
-And $privileges -Match "SeTakeOwnershipPrivilege" `
-And $privileges -Match "SeLoadDriverPrivilege" `
-And $privileges -Match "SeBackupPrivilege" `
-And $privileges -Match "SeRestorePrivilege" `
-And $privileges -Match "SeDebugPrivilege" `
-And $privileges -Match "SeAuditPrivilege" `
-And $privileges -Match "SeSystemEnvironmentPrivilege" `
-And $privileges -Match "SeImpersonatePrivilege" `
-And $privileges -Match "SeDelegateSessionUserImpersonatePrivilege") {
$obj.Message = "Mimikatz token::elevate Privilege Escalation"
$obj.Results = "Username: $username`n"
$obj.Results += "Domain: $domain`n"
$obj.Results += "User SID: $securityid`n"
$pprivileges = $privileges -replace "`n",", " -replace "\s+"," "
$obj.Results += "Privileges: $pprivileges"
Write-Output($obj)
}
}
ElseIf ($event.id -eq 4720){
# A user account was created.

Binary file not shown.