
Summary
This detection rule focuses on identifying suspicious activities associated with writing to local admin shares in a Windows environment. Aversaries may attempt to interact with remote network shares using Server Message Block (SMB) technology, which is common in post-exploitation scenarios. The rule specifically looks for file events where the target filename contains references to local admin shares, like '\\127.0.0' or '\ADMIN$\'. The presence of these file events could indicate potential lateral movement by an attacker who is executing commands to manipulate files in a way that may not align with standard operational practices. The detection is categorized under medium severity, suggesting a moderate level of threat that necessitates further investigation but is not necessarily indicative of a confirmed breach. As with most security rules, false positives are possible, and they are indeed acknowledged as 'Unknown' in this case, suggesting that while this event is significant, it may also occur in benign circumstances.
Categories
- Windows
- Network
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1021.002
Created: 2022-01-01