I turned on file system auditing on our Windows shares quite a long time 
ago, it's just handy to have running for those times when you want to find 
out specifics when users get paranoid.

This isn't an original thought but it seems like we have almost all the 
ingredients to come up with a detection rule for cryptolocker outbreaks. 
 When you zip a file on the network, it creates a 4663 AUDIT_SUCCESS rule 
along with Accesses %%4417 in the "Access Request Information".

Has anyone looked into creating a trip wire for an OSSEC rule in such a use 
case?  Does Cryptolocker (or variants) go wild on the network drives 
encrypting all the files (read file, write encrypted version, delete 
encrypted version) or do they throttle?

Just in a base test... it doesn't look like OSSEC pulls enough information 
from the audit log to be precision accurate.  We should pull out the *user 
name* and fire an alert on X number of these in a 15 minute period along 
with the *Accesses:* code.

**Phase 2: Completed decoding.
       decoder: 'windows'
       status: 'AUDIT_SUCCESS'
       id: '4663'
       extra_data: 'Microsoft-Windows-Security-Auditing'
       dstuser: '(no user)'
       system_name: 'server'

**Phase 3: Completed filtering (rules).
       Rule id: '18104'
       Level: '0'
       Description: 'Windows audit success event.'


*List of access codes from Microsoft*
https://social.technet.microsoft.com/Forums/windows/en-US/0ec39516-5dcc-4453-9761-c1f94439a1cc/windows-7-security-audit-logs-how-do-i-translate-4421-1537-and-other-xxxx-data-fields?forum=w7itprosecurity

I suppose to make it a valid alert, it'd be good to run cryptolocker in a 
test lab and check that the audit logs do trigger the desired alerts.

Has anyone done this yet?  If not, would you be interested in something 
like this?

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to