Skip to content

Commit 78b4448

Browse files
authored
Create suspicious-screen-capture-utility-execution
1 parent 3258c4a commit 78b4448

1 file changed

Lines changed: 288 additions & 0 deletions

File tree

Lines changed: 288 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,288 @@
1+
# Suspicious Screen Capture Utility Execution Triage Guide
2+
3+
## Rule Overview
4+
5+
**Title:** Suspicious Screen Capture Utility Execution
6+
**Rule ID:** SENT-COLL-0003
7+
**Status:** Experimental
8+
**Severity:** Medium
9+
**Risk Score:** 56
10+
**Tactic:** Collection
11+
**Technique:** T1113 - Screen Capture
12+
**Platform:** Microsoft Sentinel
13+
**Data Source:** DeviceProcessEvents
14+
**Owner:** Detection Engineering
15+
16+
## Purpose
17+
18+
This detection identifies execution of screen capture utilities or scripted screenshot behavior that may indicate collection of user session data.
19+
20+
This matters because attackers may capture screenshots to collect:
21+
22+
- Credentials displayed on screen
23+
- MFA prompts or codes
24+
- Sensitive internal documents
25+
- Remote session activity
26+
- User workflows and visible data
27+
28+
## Detection Logic Summary
29+
30+
The rule reviews `DeviceProcessEvents` and looks for execution of known screen capture tools such as:
31+
32+
- `psr.exe`
33+
- `nircmd.exe`
34+
- `snippingtool.exe`
35+
- `snipaste.exe`
36+
37+
It also looks for command lines containing screenshot-related terms such as:
38+
39+
- `screenshot`
40+
- `capturedesktop`
41+
- `saveimage`
42+
- `screen capture`
43+
44+
The rule assigns a **SuspicionScore** based on the following logic:
45+
46+
- `+2` if the process is `nircmd.exe` or `snipaste.exe`
47+
- `+2` if the command line contains `capturedesktop`, `saveimage`, or `screenshot`
48+
- `+2` if the initiating process is one of:
49+
- `powershell.exe`
50+
- `pwsh.exe`
51+
- `cmd.exe`
52+
- `wscript.exe`
53+
- `cscript.exe`
54+
- `mshta.exe`
55+
56+
The alert fires when:
57+
58+
- `SuspicionScore >= 2`
59+
60+
## Likely Analyst Goal
61+
62+
Determine whether the screen capture behavior was:
63+
64+
- Normal user activity
65+
- Help desk, support, documentation, or training activity
66+
- Approved remote support behavior
67+
- Suspicious collection of on-screen data
68+
69+
## Initial Triage Questions
70+
71+
1. Which screen capture utility executed?
72+
2. Was the activity interactive or scripted?
73+
3. Is screenshot activity normal for this user, host, and time window?
74+
4. Were screenshots saved to suspicious or staging-related locations?
75+
5. Did clipboard access, browser credential access, archiving, or exfiltration occur nearby?
76+
77+
---
78+
79+
## Investigation Steps
80+
81+
### 1. Review the Process and Command Line
82+
83+
Inspect:
84+
85+
- `FileName`
86+
- `ProcessCommandLine`
87+
- `AccountName`
88+
- `SHA1`
89+
- `SuspicionScore`
90+
91+
Determine whether the activity involved:
92+
93+
- built-in screen capture tools
94+
- third-party capture tools
95+
- explicit screenshot-related commands
96+
97+
**Why this matters:**
98+
Scripted or explicitly directed screenshot behavior is generally more suspicious than casual user screenshots.
99+
100+
---
101+
102+
### 2. Review the Initiating Process
103+
104+
Inspect:
105+
106+
- `InitiatingProcessFileName`
107+
- `InitiatingProcessCommandLine`
108+
109+
Pay close attention when the initiating process is:
110+
111+
- `powershell.exe`
112+
- `pwsh.exe`
113+
- `cmd.exe`
114+
- `wscript.exe`
115+
- `cscript.exe`
116+
- `mshta.exe`
117+
118+
Also determine whether the process tree suggests:
119+
120+
- automation
121+
- scripting
122+
- hands-on-keyboard activity
123+
- suspicious parent-child execution
124+
125+
**Why this matters:**
126+
Screen capture launched by script interpreters or LOLBins may indicate malicious collection rather than normal user behavior.
127+
128+
---
129+
130+
### 3. Determine Whether the Activity Was Expected
131+
132+
Validate whether screenshot usage makes sense for:
133+
134+
- the user
135+
- the device
136+
- the time of day
137+
- the business workflow
138+
139+
Ask:
140+
141+
- Is this a help desk or support session?
142+
- Is the user creating documentation or training material?
143+
- Is the system used for troubleshooting or demonstrations?
144+
- Is this tool approved in the environment?
145+
146+
**Why this matters:**
147+
Screenshot activity can be legitimate, but it should be explainable in context.
148+
149+
---
150+
151+
### 4. Check for Output File Locations
152+
153+
Review whether image files were written to locations such as:
154+
155+
- `%TEMP%`
156+
- `Downloads`
157+
- `Desktop`
158+
- `AppData`
159+
- shared folders
160+
- suspected staging directories
161+
162+
Determine whether screenshots were stored in:
163+
164+
- normal user-accessible locations
165+
- hidden or temporary folders
166+
- paths associated with later transfer or archive activity
167+
168+
**Why this matters:**
169+
Screenshots saved into temp or staging locations may indicate preparation for exfiltration.
170+
171+
---
172+
173+
### 5. Hunt for Related Collection Activity
174+
175+
Review the same time window for:
176+
177+
- clipboard access
178+
- browser credential access
179+
- archive creation
180+
- file staging
181+
- email transfer
182+
- cloud upload
183+
- suspicious outbound network activity
184+
185+
**Why this matters:**
186+
Screen capture becomes more concerning when combined with other collection or exfiltration behaviors.
187+
188+
---
189+
190+
### 6. Assess User and Device Context
191+
192+
Review:
193+
194+
- whether the host is high value
195+
- whether the user is privileged
196+
- whether the device has additional alerts
197+
- whether screenshot activity is common for that system
198+
199+
**Why this matters:**
200+
Screen capture on sensitive systems may indicate collection of high-value information.
201+
202+
---
203+
204+
## Benign Explanations
205+
206+
Common legitimate scenarios include:
207+
208+
1. Legitimate user screenshots
209+
2. Support, documentation, or training workflows
210+
3. Approved remote support tooling capturing user screens
211+
212+
## Suspicious Indicators
213+
214+
Escalate concern when you observe:
215+
216+
- scripted or repeated screenshot capture
217+
- rare or dual-use utilities such as `nircmd.exe`
218+
- screenshot activity launched by PowerShell, script hosts, or LOLBins
219+
- screenshots saved into temp or staging folders
220+
- nearby clipboard, credential, archive, or exfiltration activity
221+
- other suspicious process activity on the host
222+
223+
## Triage Decision
224+
225+
### Close as Benign / False Positive
226+
227+
Close as benign when:
228+
229+
- the screenshot activity aligns to normal user behavior
230+
- the tool is approved and expected
231+
- the timing and host context make sense
232+
- no related suspicious behavior is observed
233+
234+
### Escalate as Suspicious
235+
236+
Escalate when:
237+
238+
- screenshot activity is unusual for the user or host
239+
- the process tree suggests scripting or automation
240+
- screenshots were saved to suspicious locations
241+
- nearby collection or transfer behavior is present
242+
243+
### Escalate as Likely Malicious
244+
245+
Escalate as likely malicious when:
246+
247+
- evidence shows automated or stealthy screen collection
248+
- the activity is part of a broader compromise chain
249+
- exfiltration, credential theft, or staged collection is also observed
250+
251+
## Response Actions
252+
253+
Depending on findings, consider:
254+
255+
- isolating the host if malicious collection is suspected
256+
- collecting the executed binary, hash, and command line artifacts
257+
- reviewing screenshot output paths and created image files
258+
- hunting for similar utilities and command lines across the environment
259+
- escalating to incident response if coordinated collection is confirmed
260+
261+
## Example Analyst Notes Template
262+
263+
### Analyst Summary
264+
265+
Alert fired for suspicious screen capture utility execution, potentially indicating collection of user session data or other visible on-screen information.
266+
267+
### Key Findings
268+
269+
- **Affected device:**
270+
- **Affected user:**
271+
- **Utility executed:**
272+
- **Command line:**
273+
- **Initiating process:**
274+
- **Suspicion score:**
275+
- **Screenshot save path:**
276+
- **Expected business purpose:**
277+
- **Nearby collection or exfiltration activity:**
278+
- **Final assessment:**
279+
280+
### Recommended Disposition
281+
282+
- Benign / False Positive
283+
- Suspicious - Needs Deeper Investigation
284+
- Confirmed Malicious
285+
286+
## Validation Guidance
287+
288+
A useful validation method is to launch benign screen capture utilities in a lab and compare the resulting telemetry against normal user behavior and approved help desk workflows. This helps tune the rule so legitimate support and documentation activity does not create excessive noise.

0 commit comments

Comments
 (0)