title: Reconnaissance Activity with Net Command id: 2887e914-ce96-435f-8105-593937e90757 status: experimental description: Detects a set of commands often used in recon stages by different attack groups references: - https://twitter.com/haroonmeer/status/939099379834658817 - https://twitter.com/c_APT_ure/status/939475433711722497 - https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html author: Florian Roth, Markus Neis date: 2018/08/22 modified: 2020/11/28 tags: - attack.discovery - attack.t1087 - attack.t1082 - car.2016-03-001 logsource: category: process_creation product: windows detection: selection: - CommandLine: - tasklist - net time - systeminfo - whoami - nbtstat - net start - qprocess - nslookup - hostname.exe - 'netstat -an' - CommandLine|endswith: - '\net1 start' - '\net1 user /domain' - '\net1 group /domain' - '\net1 group "domain admins" /domain' - '\net1 group "Exchange Trusted Subsystem" /domain' - '\net1 accounts /domain' - '\net1 user net localgroup administrators' timeframe: 15s condition: selection | count() by CommandLine > 4 falsepositives: - False positives depend on scripts and administrative tools used in the monitored environment level: medium