Detection rules › Sigma
HackTool - Potential Impacket Lateral Movement Activity
Detects wmiexec/dcomexec/atexec/smbexec from Impacket framework
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Execution | T1047 Windows Management Instrumentation |
| Lateral Movement | T1021.003 Remote Services: Distributed Component Object Model |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: 1 of selection_other
or:
ParentImage|endswith: '\explorer.exe'
ParentImage|endswith: '\mmc.exe'
ParentImage|endswith: '\services.exe'
ParentImage|endswith: '\wmiprvse.exe'
CommandLine|contains: '&1'
CommandLine|contains: '/Q'
CommandLine|contains: '/c'
CommandLine|contains: '\\\\127.0.0.1\\'
CommandLine|contains: cmd.exe
Stage 2: 1 of selection_atexec
or:
ParentCommandLine|contains: 'svchost.exe -k netsvcs'
ParentCommandLine|contains: taskeng.exe
CommandLine|contains: '&1'
CommandLine|contains: '/C'
CommandLine|contains: 'Windows\Temp\'
CommandLine|contains: cmd.exe
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
ParentCommandLine | match |
|
ParentImage | ends_with |
|