heroui logo

Potential Lateral Tool Transfer via SMB Share

Elastic Detection Rules

View Source
Summary
The detection rule 'Potential Lateral Tool Transfer via SMB Share' is designed to identify the creation or modification of Windows executable files over network shares. It is based on the premise that adversaries often utilize network shares to host tools or malware intended for lateral movement within a compromised environment. The rule operates by monitoring network events specific to SMB (port 445) and correlating them with file creation or changes that involve executables, such as .exe, .scr, .dll, and similar extensions. When an executable file is transferred or altered over the network, the rule generates an alert for further investigation. The rule leverages Elastic's EQL (Event Query Language) to analyze events from endpoint logs related to file and network activities, thereby detecting potentially malicious actions. Investigative steps include checking the process execution chain, identifying the responsible user account, and validating the legitimacy of the transferred files, including conducting malware analysis and checking hash values against known databases. The rule is essential for organizations using Windows environments and looking to enhance their security posture against lateral movement threats that exploit network shares. It emphasizes a balanced approach, considering both detection and potential false positives, allowing security teams to implement incident response procedures effectively based on the alert's findings.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Network Traffic
ATT&CK Techniques
  • T1021
  • T1021.002
  • T1570
Created: 2020-11-10