
Summary
This analytic rule focuses on detecting suspicious PowerShell commands that initiate processes on remote endpoints through the DCOM protocol. Specifically, it utilizes PowerShell Script Block Logging (EventCode=4104) to find the execution patterns associated with commands such as ShellExecute and ExecuteShellCommand. This behavior is indicative of lateral movement or remote code execution, commonly employed by adversaries to access other systems within a network. If detected and confirmed as malicious, such activity can allow threat actors to execute arbitrary code on remote machines, posing significant security risks and facilitating further network compromises. Enabling this warning is crucial as it provides visibility into potentially malicious remote actions.
Categories
- Endpoint
Data Sources
- Persona
- Process
- Script
- File
ATT&CK Techniques
- T1021
- T1021.003
- T1021.006
Created: 2024-11-13