Suspicious Exe File Event With System Image
Detects potential SMB file creation activity associated with Impacket smbclient.py.
Sigma rule (View on GitHub)
1title: Suspicious Exe File Event With System Image
2id: 2ace112a-1717-4648-b0f8-51796f36c58e
3status: experimental
4description: Detects potential SMB file creation activity associated with Impacket smbclient.py.
5references:
6 - https://github.com/fortra/impacket/blob/impacket_0_10_0/examples/smbclient.py
7author: Micah Babinski
8date: 2023/04/16
9tags:
10 - attack.lateral_movement
11 - attack.t1105
12logsource:
13 product: windows
14 category: file_event
15detection:
16 selection:
17 TargetFilename|endswith: '.exe'
18 Image: System
19 User: 'NT Authority\Sytem'
20 condition: selection
21falsepositives:
22 - Unknown
23level: low```
References
Related rules
- Executable Deployment from Remote Share
- Suspicious Registry Key Added: LanmanServer Parameters
- Suspicious Registry Key Set (MaxMpxCt)
- Potential SMB DLL Lateral Movement
- AnyDesk Network