2019-01-16 23:36:31 +01:00
title : Net.exe Execution
2019-11-12 23:12:27 +01:00
id : 183e7ea8-ac4b-4c23-9aec-b3dac4e401ac
2019-01-16 23:36:31 +01:00
status : experimental
description : Detects execution of Net.exe, whether suspicious or benign.
references :
2019-03-02 00:14:20 +01:00
- https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
2019-01-16 23:36:31 +01:00
author : Michael Haag, Mark Woan (improvements)
tags :
2019-03-02 00:14:20 +01:00
- attack.s0039
- attack.lateral_movement
- attack.discovery
2019-01-16 23:36:31 +01:00
logsource :
2019-03-02 00:14:20 +01:00
category : process_creation
product : windows
2019-01-16 23:36:31 +01:00
detection :
2019-03-02 00:14:20 +01:00
selection :
Image :
- '*\net.exe'
- '*\net1.exe'
CommandLine :
- '* group*'
- '* localgroup*'
- '* user*'
- '* view*'
- '* share'
- '* accounts*'
- '* use*'
2019-06-28 19:46:34 +03:00
- '* stop *'
2019-03-02 00:14:20 +01:00
condition : selection
2019-01-16 23:36:31 +01:00
fields :
2019-03-02 00:14:20 +01:00
- CommandLine
- ParentCommandLine
2019-01-16 23:36:31 +01:00
falsepositives :
2019-03-02 00:14:20 +01:00
- Will need to be tuned. If using Splunk, I recommend | stats count by Computer,CommandLine following the search for easy hunting by computer/CommandLine.
2019-01-16 23:36:31 +01:00
level : low