Suspicious Epmap Connection
Detects suspicious "epmap" connection to a remote computer via remote procedure call (RPC)
Sigma rule (View on GitHub)
1title: Suspicious Epmap Connection
2id: 628d7a0b-7b84-4466-8552-e6138bc03b43
3status: experimental
4description: Detects suspicious "epmap" connection to a remote computer via remote procedure call (RPC)
5references:
6 - https://github.com/RiccardoAncarani/TaskShell/
7author: frack113, Tim Shelton (fps)
8date: 2022/07/14
9modified: 2023/09/01
10tags:
11 - attack.lateral_movement
12logsource:
13 category: network_connection
14 product: windows
15detection:
16 selection:
17 Protocol: tcp
18 Initiated: 'true'
19 DestinationPort: 135
20 #DestinationPortName: epmap
21 filter_image:
22 Image|startswith:
23 - C:\Windows\
24 - C:\ProgramData\Amazon\SSM\Update\amazon-ssm-agent-updater
25 filter_image_null1:
26 Image: null
27 filter_image_null2:
28 Image: ''
29 condition: selection and not 1 of filter_*
30falsepositives:
31 - Unknown
32level: high
References
Related rules
- Copy from Admin Share
- New Port Forwarding Rule Added Via Netsh.EXE
- Possible Impacket DCOMExec Connection Attempt - Zeek
- Apache Threading Error
- Outgoing Logon with New Credentials