Files
blue-team-tools/deprecated/windows/net_connection_win_susp_epmap.yml
T
Nasreddine Bencherchali 1758511a2e
Create Release / Create Release (push) Has been cancelled
Merge PR #4762 from @nasbench - Fix false positives found in testing
fix: Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process - Add multiple new FP filters seen in the wild
fix: Potential System DLL Sideloading From Non System Locations - Add multiple new FP filters seen in the wild
new: CrackMapExec File Indicators
remove: CrackMapExec File Creation Patterns
remove: Suspicious Epmap Connection
2024-03-11 16:58:55 +01:00

35 lines
957 B
YAML

title: Suspicious Epmap Connection
id: 628d7a0b-7b84-4466-8552-e6138bc03b43
status: deprecated
description: Detects suspicious "epmap" connection to a remote computer via remote procedure call (RPC)
references:
- https://github.com/RiccardoAncarani/TaskShell/
author: frack113, Tim Shelton (fps)
date: 2022/07/14
modified: 2024/03/01
tags:
- attack.lateral_movement
logsource:
category: network_connection
product: windows
detection:
selection:
Protocol: tcp
Initiated: 'true'
DestinationPort: 135
# DestinationPortName: epmap
filter_image:
Image|startswith:
- C:\Windows\
- C:\ProgramData\Amazon\SSM\Update\amazon-ssm-agent-updater
filter_image_null1:
Image: null
filter_image_null2:
Image: ''
filter_image_unknown:
Image: '<unknown process>'
condition: selection and not 1 of filter_*
falsepositives:
- Unknown
level: high