
Summary
This detection rule is designed to identify potential unauthorized lateral movement activities within Windows environments, specifically targeting the copying of files to or from Admin shares (particularly the Sysvol folder). The rule monitors process creation events where specific commands related to file copying are executed. It correlates various indicators such as the use of 'copy' commands, as well as specific file and directory names that are often associated with lateral movement activities in Windows, notably when using administrative shares. In particular, it looks for executions of tools like 'robocopy' and 'xcopy', which are typically used for transferring files and may be leveraged by attackers to exfiltrate data or move laterally within a network. The intention behind monitoring these actions is to provide visibility into possible malicious behavior that could indicate a compromise or a prelude to deeper infiltration attempts.
Categories
- Windows
- Network
- Endpoint
Data Sources
- Process
- File
- Network Traffic
Created: 2019-12-30