ATT&CK coverage › Technique
Remote Services: SMB/Windows Admin Shares T1021.002
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.
Events covered
17 catalog events are tagged with this technique by at least one rule.
Authoring guide
Patterns shared across the 42 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.
Fields filtered most (36 distinct)
The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.
Top indicator values (180 distinct)
Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.
Common exclusions (48 distinct)
Field/operator/value combinations that rules under this technique routinely exclude (top-level not() clauses). These are the false-positive paths the community has learned to filter out. A new rule that ignores the high-count entries here will likely fire on the same noisy paths.
Rules under this technique
Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.
Sigma 33 rules
- Access To ADMIN$ Network Share
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System
- Copy From Or To Admin Share Or Sysvol Folder
- DCERPC SMB Spoolss Named Pipe
- DCOM InternetExplorer.Application Iertutil DLL Hijack - Security
- First Time Seen Remote Named Pipe
- HackTool - NetExec File Indicators
- HackTool - SharpMove Tool Execution
- Impacket PsExec Execution
- Metasploit Or Impacket Service Installation Via SMB PsExec
- Metasploit SMB Authentication
- Password Provided In Command Line Of Net.EXE
- Potential CobaltStrike Service Installations - Registry
- Potential DCOM InternetExplorer.Application DLL Hijack
- Potential DCOM InternetExplorer.Application DLL Hijack - Image Load
- Protected Storage Service Access
- PUA - CSExec Default Named Pipe
- PUA - RemCom Default Named Pipe
- Remote Service Activity via SVCCTL Named Pipe
- Rundll32 Execution Without Parameters
- Rundll32 UNC Path Execution
- SMB Create Remote File Admin Share
- smbexec.py Service Installation
- Suspicious New-PSDrive to Admin Share
- Suspicious PsExec Execution
- T1047 Wmiprvse Wbemcomn DLL Hijack
- Unsigned or Unencrypted SMB Connection to Share Established
- Windows Admin Share Mount Via Net.EXE
- Windows Internet Hosted WebDav Share Mount Via Net.EXE
- Windows Share Mount Via Net.EXE
- Wmiprvse Wbemcomn DLL Hijack
- Wmiprvse Wbemcomn DLL Hijack - File
Elastic 3 rules
- Potential Machine Account Relay Attack via SMB
- Remote Windows Service Installed
- Suspicious Remote Registry Access via SeBackupPrivilege