heroui logo

smbexec.py Service Installation

Sigma Rules

View Source
Summary
The rule detects the unauthorized use of the smbexec.py tool for lateral movement within a Windows environment by monitoring service installations related to it. Specifically, it looks for the installation of a service named 'BTOBTO' through the Windows Service Control Manager (SCM). The rule triggers on specific event ID 7045, which indicates a service installation request. Additionally, it checks that the service creation involves suspicious commands in the image path that suggest the use of batch files typically associated with malicious scripts (e.g., using redirection operators like '>', indicating potential output manipulation). This combination allows defenders to identify potentially malicious activity leveraging the smbexec tool, which is capable of executing commands on remote systems through SMB (Server Message Block) protocol.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Service
  • Logon Session
Created: 2018-03-20