title: Suspicous Remote Logon with Explicit Credentials id: 941e5c45-cda7-4864-8cea-bbb7458d194a status: experimental description: Detects suspicious processes logging on with explicit credentials references: - https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view author: 'oscd.community, Teymur Kheirkhabarov @HeirhabarovT, Zach Stanford @svch0st' date: 2020/10/05 tags: - attack.t1078 - attack.lateral_movement logsource: product: windows service: security definition: detection: selection: EventID: 4648 Image|endswith: - '\cmd.exe' - '\powershell.exe' - '\pwsh.exe' - '\winrs.exe' - '\wmic.exe' - '\net.exe' - '\net1.exe' - '\reg.exe' filter: Target_Server_Name: 'localhost' condition: selection and not filter falsepositives: - Administrators that use the RunAS command or scheduled tasks level: medium