2019-01-16 22:36:31 +00:00
title : Net.exe Execution
status : experimental
description : Detects execution of Net.exe, whether suspicious or benign.
references :
2019-03-01 23:14:20 +00:00
- https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
2019-01-16 22:36:31 +00:00
author : Michael Haag, Mark Woan (improvements)
tags :
2019-03-01 23:14:20 +00:00
- attack.s0039
- attack.lateral_movement
- attack.discovery
2019-01-16 22:36:31 +00:00
logsource :
2019-03-01 23:14:20 +00:00
category : process_creation
product : windows
2019-01-16 22:36:31 +00:00
detection :
2019-03-01 23:14:20 +00:00
selection :
Image :
- '*\net.exe'
- '*\net1.exe'
CommandLine :
- '* group*'
- '* localgroup*'
- '* user*'
- '* view*'
- '* share'
- '* accounts*'
- '* use*'
2019-06-28 16:46:34 +00:00
- '* stop *'
2019-03-01 23:14:20 +00:00
condition : selection
2019-01-16 22:36:31 +00:00
fields :
2019-03-01 23:14:20 +00:00
- CommandLine
- ParentCommandLine
2019-01-16 22:36:31 +00:00
falsepositives :
2019-03-01 23:14:20 +00:00
- Will need to be tuned. If using Splunk, I recommend | stats count by Computer,CommandLine following the search for easy hunting by computer/CommandLine.
2019-01-16 22:36:31 +00:00
level : low