
Summary
This rule is designed to detect execution patterns associated with the CrackMapExec (CME) pentesting framework, which is often used for post-exploitation in Windows environments. The detection mechanism focuses on monitoring process creation events where specific command line arguments typically associated with CME are present. The rule looks for various command constructs that are indicative of exploitation techniques, including commands that redirect output to remote locations or temporary files, as well as PowerShell commands that bypass execution policies. The detection conditions require the presence of certain strings in the command line, which are characteristic of attempts to utilize CrackMapExec for unauthorized access. This makes the rule particularly valuable for identifying potentially malicious actions taken by threat actors leveraging CME for lateral movement or data exfiltration across networks. Careful attention should be paid to the context of such detections, as legitimate administrative tasks may sometimes generate similar command lines.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-05-22