HackTool - WinRM Access Via Evil-WinRM
Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.
Sigma rule (View on GitHub)
1title: HackTool - WinRM Access Via Evil-WinRM
2id: a197e378-d31b-41c0-9635-cfdf1c1bb423
3status: test
4description: Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.006/T1021.006.md#atomic-test-3---winrm-access-with-evil-winrm
7 - https://github.com/Hackplayers/evil-winrm
8author: frack113
9date: 2022-01-07
10modified: 2023-02-13
11tags:
12 - attack.lateral-movement
13 - attack.t1021.006
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 Image|endswith: '\ruby.exe'
20 CommandLine|contains|all:
21 - '-i '
22 - '-u '
23 - '-p '
24 condition: selection
25falsepositives:
26 - Unknown
27level: medium
References
Related rules
- Enable Windows Remote Management
- Execute Invoke-command on Remote Host
- OMIGOD HTTP No Authentication RCE
- Potential Remote PowerShell Session Initiated
- Remote LSASS Process Access Through Windows Remote Management