
Summary
This rule set focuses on detecting potential persistence techniques on remote Windows systems through the analysis of specific DCE-RPC function calls using Zeek (formerly known as Bro). Persistence mechanisms are significant for attackers as they allow malicious payloads to survive system reboots and user logoff events, effectively maintaining their foothold within the compromised environment. The indicators include operations related to the endpoint `spoolss` and `IRemoteWinspool`, such as `RpcAddMonitor`, `RpcAddPrintProcessor`, `RpcAsyncAddMonitor`, and `RpcAsyncAddPrintProcessor`, as well as operations related to `ISecLogon` like `SeclCreateProcessWithLogonW` and `SeclCreateProcessWithLogonExW`. The rule triggers when any of the specified DCE-RPC operations are detected, signifying potential unauthorized persistence activity. False positives are acknowledged from legitimate Windows administrator tasks, troubleshooting, and management scripts, which may also invoke similar DCE-RPC functions. The intent of this detection rule is to assist security teams in identifying possible persistence threats efficiently.
Categories
- Windows
- Network
Data Sources
- Driver
- Network Traffic
- Process
Created: 2020-03-19