
Summary
The detection rule titled 'Net.exe Use with URL' is designed to identify attempts made using the 'net use' command in Windows systems to map a drive to a URL, which is a behavior typically associated with malicious loaders like BumbleBee. The logic operates by querying the CrowdStrike EDR logs to filter for process events that occurred within the last two hours where the event platform matches Windows (denoted by 'Win') and the process name fits a specific regular expression that matches the syntax of the 'net use' command followed by a URL. This type of activity is indicative of potential lateral movement within a network, as it may enable an attacker to leverage remote services inappropriately. The associated technique ID is T1021.002 (Lateral Movement: Remote Services: SMB/Windows Admin Shares), highlighting the relevance of this detection rule in a comprehensive threat detection strategy.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1021.002
Created: 2024-02-09