
Summary
This detection rule identifies potential malicious activity related to executable files being written to Windows administrative SMB shares, specifically the Admin$, IPC$, and C$ shares. It leverages Windows Security Event Logs, focusing on Event Code 5145, which indicates file share access attempts. This kind of file manipulation is often associated with lateral movement techniques, particularly using tools like PsExec or PaExec, which allow attackers to stage binaries on remote systems for further exploitation. If malicious, such actions could enable remote code execution, potentially compromising additional systems in the network. The rule aims to provide early detection of possible intrusions and lateral movements within an enterprise environment.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Windows Registry
- Image
- Process
ATT&CK Techniques
- T1021
- T1021.002
Created: 2024-12-10