SigmaHQ/rules/windows/process_creation/win_susp_commands_recon_activity.yml
2021-07-01 12:18:30 +05:45

46 lines
1.4 KiB
YAML

title: Reconnaissance Activity with Net Command
id: 2887e914-ce96-435f-8105-593937e90757
status: experimental
description: Detects a set of commands often used in recon stages by different attack groups
references:
- https://twitter.com/haroonmeer/status/939099379834658817
- https://twitter.com/c_APT_ure/status/939475433711722497
- https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html
author: Florian Roth, Markus Neis
date: 2018/08/22
modified: 2020/11/28
tags:
- attack.discovery
- attack.t1087
- attack.t1082
- car.2016-03-001
logsource:
category: process_creation
product: windows
detection:
selection:
- CommandLine:
- tasklist
- net time
- systeminfo
- whoami
- nbtstat
- net start
- qprocess
- nslookup
- hostname.exe
- 'netstat -an'
- CommandLine|endswith:
- '\net1 start'
- '\net1 user /domain'
- '\net1 group /domain'
- '\net1 group "domain admins" /domain'
- '\net1 group "Exchange Trusted Subsystem" /domain'
- '\net1 accounts /domain'
- '\net1 user net localgroup administrators'
timeframe: 15s
condition: selection | count() by CommandLine > 4
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: medium