Detection rules › Sigma

Suspicious Group And Account Reconnaissance Activity Using Net.EXE

Severity
medium
Author
Florian Roth (Nextron Systems), omkar72, @svch0st, Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)

MITRE ATT&CK coverage

TacticTechniques
DiscoveryT1087.001 Account Discovery: Local Account, T1087.002 Account Discovery: Domain Account

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: selection_img

or:
Image|endswith: '\net.exe'
Image|endswith: '\net1.exe'
OriginalFileName: net.exe
OriginalFileName: net1.exe

Stage 2: all of selection_group_root

or:
CommandLine|contains: ' group '
CommandLine|contains: ' localgroup '

Stage 3: all of selection_group_flags

or:
CommandLine|contains: ' /do'
CommandLine|contains: ' administrateur'
CommandLine|contains: ' administrator'
CommandLine|contains: 'Exchange Trusted Subsystem'
CommandLine|contains: 'Remote Desktop Users'
CommandLine|contains: 'Usuarios de escritorio remoto'
CommandLine|contains: 'Utilisateurs du Bureau à distance'
CommandLine|contains: 'domain admins'
CommandLine|contains: 'enterprise admins'

Stage 4: not filter_group_add

CommandLine|contains: ' /add'

Stage 5: all of selection_accounts_root

CommandLine|contains: ' accounts '

Stage 6: all of selection_accounts_flags

CommandLine|contains: ' /do'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • /add corpus 5 (sigma 5)
  • /do
  • accounts
  • administrateur corpus 3 (sigma 3)
  • administrator corpus 2 (sigma 2)
  • group corpus 2 (sigma 2)
  • localgroup corpus 2 (sigma 2)
  • Exchange Trusted Subsystem corpus 2 (sigma 2)
  • Remote Desktop Users corpus 3 (sigma 3)
  • Usuarios de escritorio remoto corpus 3 (sigma 3)
  • Utilisateurs du Bureau à distance corpus 3 (sigma 3)
  • domain admins corpus 2 (sigma 2)
  • enterprise admins corpus 2 (sigma 2)
Imageends_with
  • \net.exe corpus 27 (sigma 27)
  • \net1.exe corpus 25 (sigma 25)
OriginalFileNameeq
  • net.exe corpus 16 (sigma 16)
  • net1.exe corpus 16 (sigma 16)