
Summary
This detection rule is designed to identify suspicious computer names that contain a pattern indicative of a utilization of a hack tool. Specifically, it targets computer names that begin with 'SAMTHEADMIN-' and end with a dollar sign ($), representing potential credential harvesting and privilege escalation attempts linked to the Common Vulnerabilities and Exposures (CVE) reported for Windows systems. The rule cross-examines two criteria: the 'SamAccountName' and the 'TargetUserName' fields for the specified patterns. Triggering this detection may indicate an attempt to create accounts that can perform malicious activities within a Windows environment, particularly through persistence mechanisms.
Categories
- Windows
- Endpoint
Data Sources
- User Account
Created: 2022-09-09