
Summary
This detection rule is designed to identify the creation of files that match the default output filename pattern used by the wmiexec tool, part of the Impacket suite, which is often utilized in lateral movement during cyber attacks. The key identifiers for this rule include filenames that begin with '__1' followed by a nine-digit sequence and end with a dot and a one to seven-digit extension. This naming convention suggests that the files are likely created by malicious activity leveraging wmiexec to execute commands remotely on Windows machines. Monitoring for these specific file creations can help security teams respond to potential unauthorized access attempts more swiftly. By detecting these patterns, organizations can bolster their defenses against certain attack strategies that exploit Windows Management Instrumentation (WMI) for unauthorized access.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2022-06-02