Detection rules › Sigma

HackTool - Potential Impacket Lateral Movement Activity

Severity
high
Author
Ecco, oscd.community, Jonhnathan Ribeiro, Tim Rauch
Source
upstream

Detects wmiexec/dcomexec/atexec/smbexec from Impacket framework

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1047 Windows Management Instrumentation
Lateral MovementT1021.003 Remote Services: Distributed Component Object Model

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: 1 of selection_other

or:
ParentImage|endswith: '\explorer.exe'
ParentImage|endswith: '\mmc.exe'
ParentImage|endswith: '\services.exe'
ParentImage|endswith: '\wmiprvse.exe'
CommandLine|contains: '&1'
CommandLine|contains: '/Q'
CommandLine|contains: '/c'
CommandLine|contains: '\\\\127.0.0.1\\'
CommandLine|contains: cmd.exe

Stage 2: 1 of selection_atexec

or:
ParentCommandLine|contains: 'svchost.exe -k netsvcs'
ParentCommandLine|contains: taskeng.exe
CommandLine|contains: '&1'
CommandLine|contains: '/C'
CommandLine|contains: 'Windows\Temp\'
CommandLine|contains: cmd.exe

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • &1
  • /C corpus 3 (sigma 3)
  • /Q
  • /c corpus 7 (sigma 7)
  • Windows\Temp\
  • \\\\127.0.0.1\\
  • cmd.exe corpus 2 (sigma 2)
ParentCommandLinematch
  • svchost.exe -k netsvcs
  • taskeng.exe
ParentImageends_with
  • \explorer.exe corpus 11 (sigma 11)
  • \mmc.exe corpus 3 (sigma 3)
  • \services.exe corpus 7 (sigma 7)
  • \wmiprvse.exe corpus 3 (sigma 3)