Possible Impacket DCOMExec Connection Attempt - Zeek
Detects attempts to connect via DCOM Endpoints, as used by Impacket DCOMExec. This event will occur on successful or unsuccessful attempts using any of the three DCOMExec -object options.
Sigma rule (View on GitHub)
1title: Possible Impacket DCOMExec Connection Attempt - Zeek
2id: f6127748-4656-435f-b07c-c624f8f18812
3status: experimental
4description: Detects attempts to connect via DCOM Endpoints, as used by Impacket DCOMExec. This event will occur on successful or unsuccessful attempts using any of the three DCOMExec -object options.
5references:
6 - https://github.com/fortra/impacket/blob/master/impacket/dcerpc/v5/dcomrt.py
7 - https://tools.thehacker.recipes/impacket
8 - https://riccardoancarani.github.io/2020-05-10-hunting-for-impacket/
9 - https://wadcoms.github.io/wadcoms/Impacket-DCOMExec/
10author: Micah Babinski
11date: 2023/01/08
12tags:
13 - attack.s0357
14 - attack.execution
15 - attack.lateral_movement
16 - attack.t1021
17 - attack.t1021.003
18logsource:
19 product: zeek
20 service: dce_rpc
21detection:
22 selection:
23 operation: RemoteCreateInstance
24 endpoint: IRemoteSCMActivator
25 id.resp_p: 135
26 named_pipe: 135
27 condition: selection
28fields:
29 - id.orig_h
30falsepositives:
31 - Unknown
32level: low```
References
Related rules
- Metasploit Or Impacket Service Installation Via SMB PsExec
- Remote Service Creation
- Impacket AtExec Process Activity
- Suspicious Impacket PSExec Temp Executable File Creation
- Suspicious Impacket Pipe Creation - Psexec