Possible Impacket DCOMExec Connection Attempt - Zeek

Detects attempts to connect via DCOM Endpoints, as used by Impacket DCOMExec. This event will occur on successful or unsuccessful attempts using any of the three DCOMExec -object options.

Sigma rule (View on GitHub)

 1title: Possible Impacket DCOMExec Connection Attempt - Zeek
 2id: f6127748-4656-435f-b07c-c624f8f18812
 3status: experimental
 4description: Detects attempts to connect via DCOM Endpoints, as used by Impacket DCOMExec. This event will occur on successful or unsuccessful attempts using any of the three DCOMExec -object options.
 5references:
 6    - https://github.com/fortra/impacket/blob/master/impacket/dcerpc/v5/dcomrt.py
 7    - https://tools.thehacker.recipes/impacket
 8    - https://riccardoancarani.github.io/2020-05-10-hunting-for-impacket/
 9    - https://wadcoms.github.io/wadcoms/Impacket-DCOMExec/
10author: Micah Babinski
11date: 2023/01/08
12tags:
13    - attack.s0357
14    - attack.execution
15    - attack.lateral_movement
16    - attack.t1021
17    - attack.t1021.003
18logsource:
19    product: zeek
20    service: dce_rpc
21detection:
22    selection:
23        operation: RemoteCreateInstance
24        endpoint: IRemoteSCMActivator
25        id.resp_p: 135
26        named_pipe: 135
27    condition: selection
28fields:
29    - id.orig_h
30falsepositives:
31    - Unknown
32level: low```

References

Related rules

to-top