heroui logo

Esentutl Execution

Anvilogic Forge

View Source
Summary
The 'Esentutl Execution' detection rule targets the use of the 'esentutl.exe' utility, a legitimate command-line tool for managing the Windows Extensible Storage Engine databases. Adversaries can misuse this tool for their malicious activities, leveraging its typical command-line options such as '/y' for writing to the database and '/d' for defragmentation, often appearing in the context of Living Off The Land Binaries and Scripts (LOLBAS). The rule is implemented in Splunk and looks specifically for EventCode 4688 which logs process creation events. It captures instances where the esentutl command is executed, particularly focusing on the execution with common switches that might indicate a malicious intent. The rule accommodates command-line execution patterns indicative of credential dumping activities (both in Security Account Manager and NTDS), and lateral movement via tool transfer. This helps identify potentially malicious use of system binaries that might otherwise be overlooked, enhancing defensive measures against such vectors that threat actors—identified in associations such as Wizard Spider, Bazar, Conti, and Trickbot—might deploy for their operations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
  • Windows Registry
ATT&CK Techniques
  • T1003.002
  • T1105
  • T1003.003
  • T1570
  • T1564
Created: 2024-02-09