
Summary
The rule is designed to detect file creation events that correspond to the naming patterns commonly associated with CrackMapExec (CME), a popular post-exploitation toolkit used by attackers to facilitate lateral movement within networks. The detection mechanism focuses on events occurring in the 'C:\Windows\Temp' directory, a common target for malware and scripts. It looks for files that either end with specific PowerShell script extensions like 'temp.ps1' and 'msol.ps1' or match a regex pattern that indicates they are likely generated by the CME tool, such as files named with a UUID format and '.txt' extension or temporary files with an 8-letter naming convention ending in '.tmp'. This enables the identification of potential malicious activity that utilizes these specific tools for credential access or other nefarious purposes. As this rule is marked as experimental, further validation and refinement may be needed to reduce false positive rates and enhance detection accuracy.
Categories
- Windows
- Endpoint
Data Sources
- File
- Process
Created: 2024-03-11