mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 17:58:52 +00:00
45 lines
1.4 KiB
YAML
45 lines
1.4 KiB
YAML
title: Reconnaissance Activity with Net Command
|
|
id: 2887e914-ce96-435f-8105-593937e90757
|
|
status: experimental
|
|
description: Detects a set of commands often used in recon stages by different attack groups
|
|
references:
|
|
- https://twitter.com/haroonmeer/status/939099379834658817
|
|
- https://twitter.com/c_APT_ure/status/939475433711722497
|
|
- https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html
|
|
author: Florian Roth, Markus Neis
|
|
date: 2018/08/22
|
|
modified: 2018/12/11
|
|
tags:
|
|
- attack.discovery
|
|
- attack.t1087
|
|
- attack.t1082
|
|
- car.2016-03-001
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
CommandLine:
|
|
- tasklist
|
|
- net time
|
|
- systeminfo
|
|
- whoami
|
|
- nbtstat
|
|
- net start
|
|
- '*\net1 start'
|
|
- qprocess
|
|
- nslookup
|
|
- hostname.exe
|
|
- '*\net1 user /domain'
|
|
- '*\net1 group /domain'
|
|
- '*\net1 group "domain admins" /domain'
|
|
- '*\net1 group "Exchange Trusted Subsystem" /domain'
|
|
- '*\net1 accounts /domain'
|
|
- '*\net1 user net localgroup administrators'
|
|
- netstat -an
|
|
timeframe: 15s
|
|
condition: selection | count() by CommandLine > 4
|
|
falsepositives:
|
|
- False positives depend on scripts and administrative tools used in the monitored environment
|
|
level: medium
|