
Summary
The detection rule is designed to identify activity related to the execution of Impacket's atexec.py, a tool which allows attackers to execute commands on remote systems via the Windows Task Scheduler, potentially leading to unauthorized remote command execution. The rule focuses on process creation events that exhibit specific characteristics typical of atexec.py activity, such as launching command shell processes from temporary directories. Key identifiers include the detection of process creation events (Event ID 4688) linked to executables like cmd.exe or powershell.exe, along with specific command-line arguments that denote the use of temporary files—often a tactic used to obfuscate malicious activity. The rule utilizes Splunk logic for querying these events based on predefined criteria and applies regex to identify process names that follow a certain naming pattern.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1053
- T1059
- T1053.005
- T1059.003
- T1027
Created: 2024-02-09