
Summary
The 'Remote Execution via File Shares' detection rule is designed to identify instances where a file created by the virtual system process is executed on Windows endpoints, which may indicate lateral movement through network file shares. The rule utilizes an Event Query Language (EQL) sequence that correlates file creation events with subsequent process executions. It specifically looks for file operations related to executable files, filtering out trusted processes from well-known vendors such as Veeam, PDQ, CrowdStrike, Microsoft, CyberArk, Sophos, and Elastic to minimize false positives. The investigation guide recommends examining the process execution chains, checking for anomalous login events, and analyzing the DNS cache and services related to the detected process, providing analysts with a comprehensive approach for triage and analysis. It also outlines response measures to take if suspicious activity is confirmed, highlighting the need for incident response processes, malware containment strategies, and adjustments to network share permissions to mitigate further risks.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
ATT&CK Techniques
- T1021
- T1021.002
Created: 2020-11-03