heroui logo

MITRE BZAR Indicators for Execution

Sigma Rules

View Source
Summary
This detection rule is designed to identify potential execution techniques on remote systems using Windows DCE-RPC (Distributed Computing Environment / Remote Procedure Call) functions. The rule leverages specific operations within the Zeek network security monitoring framework to recognize indicators of threat activity consistent with MITRE ATT&CK techniques. The rule focuses on various operations that suggest the creation and execution of tasks on remote Windows machines, which could signify malicious or unauthorized activities. Operations include adding jobs, enabling tasks, registering tasks, and starting services through RPC calls to the respective endpoints. Because these operations can also result from legitimate administrative tasks, the rule acknowledges potential false positives such as standard Windows administrator tasks and management scripts. Overall, this rule aids in the detection of suspicious remote execution activities, enhancing an organization's threat detection capabilities against remote execution attacks.
Categories
  • Windows
  • Network
Data Sources
  • Windows Registry
  • Process
  • Network Traffic
Created: 2020-03-19