
Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows
Elastic Detection Rules
View SourceSummary
This rule identifies the suspicious use of the Distributed Component Object Model (DCOM) in Windows environments, specifically looking for instances where commands are executed remotely via the ShellBrowserWindow or ShellWindows Application COM Object. This behavior may indicate potential lateral movement by an attacker exploiting DCOM capabilities. The rule captures network traffic where incoming connections are made to high ports from external sources that are not localhost and associates these with process events where 'explorer.exe' is involved, highlighting specific parent-child process relationships to detect potential abuse. It is crucial to investigate the source IPs and any spawned processes for possible malicious intent, differentiating between normal network activity and anomalous behavior.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Network Traffic
- Windows Registry
- Application Log
ATT&CK Techniques
- T1021
- T1021.003
Created: 2020-11-06