Files
blue-team-tools/rules/windows/builtin/win_admin_share_access.yml
T

23 lines
617 B
YAML
Raw Normal View History

2017-03-14 14:53:03 +01:00
title: Access to ADMIN$ Share
2019-11-12 23:12:27 +01:00
id: 098d7118-55bc-4912-a836-dc6483a8d150
2018-06-08 11:38:27 +02:00
description: Detects access to $ADMIN share
2018-07-24 07:50:32 +02:00
tags:
- attack.lateral_movement
- attack.t1077
2017-03-14 14:53:03 +01:00
status: experimental
author: Florian Roth
logsource:
product: windows
service: security
definition: 'The advanced audit policy setting "Object Access > Audit File Share" must be configured for Success/Failure'
2017-03-14 14:53:03 +01:00
detection:
selection:
2017-03-21 10:24:20 +01:00
EventID: 5140
ShareName: Admin$
2017-03-14 14:53:03 +01:00
filter:
2018-03-26 22:53:38 +02:00
SubjectUserName: '*$'
2017-03-14 14:53:03 +01:00
condition: selection and not filter
falsepositives:
- Legitimate administrative activity
level: low