2019-01-16 23:36:31 +01:00
title : Net.exe Execution
2019-11-12 23:12:27 +01:00
id : 183e7ea8-ac4b-4c23-9aec-b3dac4e401ac
2019-01-16 23:36:31 +01:00
status : experimental
description : Detects execution of Net.exe, whether suspicious or benign.
references :
2019-03-02 00:14:20 +01:00
- https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
2019-10-25 12:06:32 +11:00
- https://eqllib.readthedocs.io/en/latest/analytics/4d2e7fc1-af0b-4915-89aa-03d25ba7805e.html
- https://eqllib.readthedocs.io/en/latest/analytics/e61f557c-a9d0-4c25-ab5b-bbc46bb24deb.html
2019-10-25 12:20:47 +11:00
- https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html
2019-10-25 12:06:32 +11:00
author : Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements)
2020-01-30 16:07:37 +01:00
date : 2019 /01/16
2020-08-30 19:17:38 +03:00
modified : 2020 /08/30
2019-01-16 23:36:31 +01:00
tags :
2020-08-30 19:17:38 +03:00
- attack.discovery
2019-10-25 12:06:32 +11:00
- attack.t1049
2020-08-30 19:17:38 +03:00
- attack.t1018
2019-10-25 12:06:32 +11:00
- attack.t1135
2020-08-30 19:17:38 +03:00
- attack.t1201
- attack.t1069.001
- attack.t1069.002
- attack.t1087.001
- attack.t1087.002
- attack.lateral_movement
- attack.t1021.002
- attack.t1077 # an old one
- attack.s0039
2019-01-16 23:36:31 +01:00
logsource :
2019-03-02 00:14:20 +01:00
category : process_creation
product : windows
2019-01-16 23:36:31 +01:00
detection :
2019-03-02 00:14:20 +01:00
selection :
Image :
- '*\net.exe'
- '*\net1.exe'
2019-10-25 12:06:32 +11:00
cmdline :
2019-03-02 00:14:20 +01:00
CommandLine :
- '* group*'
- '* localgroup*'
- '* user*'
- '* view*'
- '* share'
- '* accounts*'
- '* use*'
2019-06-28 19:46:34 +03:00
- '* stop *'
2019-11-11 02:57:59 +03:00
condition : selection and cmdline
2019-01-16 23:36:31 +01:00
fields :
2020-01-11 00:11:27 +01:00
- ComputerName
- User
2019-03-02 00:14:20 +01:00
- CommandLine
- ParentCommandLine
2019-01-16 23:36:31 +01:00
falsepositives :
2019-03-02 00:14:20 +01:00
- Will need to be tuned. If using Splunk, I recommend | stats count by Computer,CommandLine following the search for easy hunting by computer/CommandLine.
2019-01-16 23:36:31 +01:00
level : low