
Summary
The 'Network Share Discovery Via Dir Command' analytic rule aims to detect unauthorized access attempts to Windows administrative SMB shares, specifically targeting the shares Admin$, IPC$, and C$. This detection is based on Windows Security Event Logs, particularly EventCode 5140, which logs share access events. By monitoring for instances where the 'dir' command is used, this rule can identify potential lateral movement techniques often employed by threat actors using tools like PsExec or PaExec. Such activities are indicative of attempts to exploit Windows environments by gaining unauthorized access to sensitive shares for malicious purposes, such as installing malware like IcedID. If flagged, this behavior is taken seriously as it could lead to widespread malware propagation and severe data breaches across the network. The implementation of this rule requires the ingestion of specific event logs and settings adjustments in group policy to properly audit access events.
Categories
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1135
Created: 2024-11-13