- Home
- Correlation Rule Library
- SharpUp Detection
Detecting the presence of SharpUp tool
Rule added on 20th February, 2024In this page
Prerequisite:
The rule requires Sysmon to be enabled for proper functioning.
Rule type:
Correlation rule
Rule description:
This correlation rule aims to identify the presence of SharpUp, a C# port of the PowerUp privilege escalation tool.
Data source:
Windows: process
Relevant MITRE ATT&CK techniques and tactics:
Tactics: TA0007 - Discovery, TA0005 - Defense Evasion
Techniques: T1069 - Permission Groups Discovery, T1222 - File and Directory Permissions Modifications, T1057 - Process Discovery
Criteria:
Original file name ends with "SharpUp": The rule scans log entries for events where the original filename of a file ends with the string "SharpUp". This could indicate attempts to download, transfer, or execute the SharpUp tool.
Process name ends with "SharpUp.exe": This condition checks if the event log entry indicates a process name ending with "SharpUp.exe". This identifies events where SharpUp.exe is involved.
AND Command line not ends with SharpUpgrade.exe: This condition further refines the identification by excluding events where the command line ends with "SharpUpgrade.exe". SharpUpgrade.exe is a legitimate tool used for Windows upgrades. By excluding it, the rule focuses on SharpUp.exe being used potentially for malicious purposes.
When to enable this rule:
This correlation rule should be implemented when the user wants to detect potential privilege escalation attempts using the SharpUp tool.
Compliance mapping (NIST, CIS):
Enabling this rule will help you meet the below requirements of regulatory standards and compliance mandates pertaining to detection of malicious software installations.
NIST Cybersecurity Framework (CSF):
- Anomalies in System Process Execution (DE.AE-1): Detection of suspicious process executions associated with SharpUp, such as attempts to escalate privileges.
- Irregular Access to Credential Stores (DE.CM-1): Identification of unauthorized access attempts or modifications related to credential stores or system services.
- Security Log Anomalies (DE.CM-7): Alerting on activities indicating attempts to exploit privilege escalation vulnerabilities.
CIS:
- Control 8: Malware Defense: Implement mechanisms to detect and prevent the execution of SharpUp and similar tools targeting privilege escalation.
- Control 6: Maintenance, Monitoring, and Analysis of Audit Logs: Continuously monitor audit logs for anomalies indicating SharpUp usage or suspicious activities targeting privilege escalation.
Next steps:
Upon triggering this alert, the following actions can be taken:
- Identification: Mark this alert as a part of an existing incident or initiate a new incident. Assigning the incident to an analyst for in-depth examination.
- Analysis: Conduct an impact investigation and thoroughly analyze the degree of compromise utilizing the Incident Workbench to gain insights into the threat's severity.
- Response: Initiate automated workflow execution to swiftly terminate the identified malicious process, leveraging Workflows for prompt mitigation.