Skip to the content.

back

Find sigma rule :heavy_check_mark:

Attack: Input Capture: Credential API Hooking

Adversaries may hook into Windows application programming interface (API) functions to collect user credentials. Malicious hooking mechanisms may capture API calls that include parameters that reveal user authentication credentials.(Citation: Microsoft TrojanSpy:Win32/Ursnif.gen!I Sept 2017) Unlike Keylogging, this technique focuses specifically on API functions that include parameters that reveal user credentials. Hooking involves redirecting calls to these functions and can be implemented via:

MITRE

Tactic

technique

Test : Hook PowerShell TLS Encrypt/Decrypt Messages

OS

Description:

Hooks functions in PowerShell to read TLS Communications

Executor

powershell

Sigma Rule

back