
Summary
This rule is designed to detect potential unauthorized access attempts to Windows SMB shares from external IP addresses. It identifies patterns in the Windows event log where an external user successfully logs on (Event ID 4624, Logon Type 3) and then performs SMB operations such as access or enumerate shares (Event IDs 5140 or 5145) in a very short time frame (within one minute). The rule accounts for several exclusions to avoid false positives, filtering out local and private network IP addresses. By utilizing the specified event log data, the rule aggregates and correlates information such as the timestamp, host, user, and geographic location of the source IP. The underlying implications of this activity can indicate a threat actor's attempt to exploit Windows network file sharing services from the internet, reflecting potential initial access risk patterns via SMB.
Categories
- Windows
- Network
- Cloud
- Infrastructure
Data Sources
- Windows Registry
- Application Log
- Network Traffic
ATT&CK Techniques
- T1190
Created: 2024-03-21