Detection rules › Sigma

Share And Session Enumeration Using Net.EXE

Severity
low
Author
Endgame, JHasenbusch (ported for oscd.community)
Source
upstream

Detects attempts to enumerate file shares, printer shares and sessions using "net.exe" with the "view" flag.

MITRE ATT&CK coverage

TacticTechniques
DiscoveryT1018 Remote System Discovery

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\net.exe'
Image|endswith: '\net1.exe'
OriginalFileName: net.exe
OriginalFileName: net1.exe

Stage 2: all of selection_cli

CommandLine|contains: view

Stage 3: not filter

CommandLine|contains: '\\\\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • \\\\ corpus 7 (sigma 7)
  • view
Imageends_with
  • \net.exe corpus 27 (sigma 27)
  • \net1.exe corpus 25 (sigma 25)
OriginalFileNameeq
  • net.exe corpus 16 (sigma 16)
  • net1.exe corpus 16 (sigma 16)