
Summary
The Impacket SMB File Transfer rule is designed to detect the use of Impacket tools that manipulate and transfer files over the SMB protocol in a Windows environment. Impacket is a widely utilized library for implementing various network protocols and includes tools capable of executing remote services, handling Kerberos, and conducting credential dumping. This rule targets instances where Python scripts (specifically ones like 'smbclient.py') are employed for file transfer operations and lateral movement techniques by monitoring process command-line parameters and EDR logs. The detection logic utilizes a series of field extractions and regular expressions to isolate relevant processes and their parameters, while cross-referencing DNS lookups to identify destination IP addresses and related hosts. By binning timeframes and aggregating the results, this rule allows for efficient monitoring of potentially malicious SMB file transfer activities, thereby enhancing the detection capabilities against lateral movement tactics employed by threats such as the LockBit ransomware.
Categories
- Endpoint
- Network
Data Sources
- Process
- Script
ATT&CK Techniques
- T1570
Created: 2024-02-09