
Summary
This detection rule identifies the use of suspicious command-line parameters associated with Impacket tools, which are frequently utilized for lateral movement and remote code execution by adversaries and Red Teams. The rule specifically monitors for activities related to tools such as `wmiexec.py`, `smbexec.py`, `dcomexec.py`, and `atexec.py` by analyzing process execution logs provided by Endpoint Detection and Response (EDR) agents. The focus is on specific command-line patterns that indicate potential malicious intent. High scrutiny is placed on the command execution patterns that include reverse shell commands or execution requests that leverage specific Windows features for remote process creation. If confirmed as malicious, the identified activities could enable attackers to remotely execute commands within a compromised environment, leading to significant security breaches and data exfiltration risks. The implementation of this detection requires comprehensive logging of process executions as per the specifications defined for the Splunk platform, ensuring that critical Information Model (CIM) fields are appropriately mapped for effective monitoring and incident response.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
- Image
- Logon Session
ATT&CK Techniques
- T1021
- T1047
- T1053
- T1021.002
- T1021.003
- T1543.003
Created: 2024-12-10