heroui logo

Impacket Lateral Movement Activity

Anvilogic Forge

View Source
Summary
The rule detects lateral movement activity associated with Impacket, a suite of Python classes that provide tools for working with network protocols commonly used in penetration testing and red teaming. Specifically, it focuses on the usage of tools within Impacket such as wmiexec, smbexec, and dcomexec that can execute commands on remote systems. The detection logic is built upon the monitoring of Event Code 4688, which indicates the creation of a new process, and looks for specific patterns in process names and command-line arguments typically associated with Impacket activities. The rule captures instances when processes like 'cmd.exe', 'powershell.exe', or 'pwsh.exe' are executed in conjunction with parent processes like 'wmiprvse.exe', 'mmc.exe', 'explorer.exe', and 'services.exe', filtering for those that target the 'Windows\Temp' directory. The gathered data includes timestamps, hostnames, users, and process details, which are consolidated to monitor potential unauthorized activities indicative of lateral movement.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1021.002
  • T1210
  • T1047
  • T1021
Created: 2024-02-09