Recon Information for Export with Command Prompt
Once established within a system or network, an adversary may use automated techniques for collecting internal data.
Sigma rule (View on GitHub)
1title: Recon Information for Export with Command Prompt
2id: aa2efee7-34dd-446e-8a37-40790a66efd7
3related:
4 - id: 8e0bb260-d4b2-4fff-bb8d-3f82118e6892
5 type: similar
6status: test
7description: Once established within a system or network, an adversary may use automated techniques for collecting internal data.
8references:
9 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1119/T1119.md
10author: frack113
11date: 2021-07-30
12modified: 2022-09-13
13tags:
14 - attack.collection
15 - attack.t1119
16logsource:
17 product: windows
18 category: process_creation
19detection:
20 selection_image:
21 - Image|endswith:
22 - '\tree.com'
23 - '\WMIC.exe'
24 - '\doskey.exe'
25 - '\sc.exe'
26 - OriginalFileName:
27 - 'wmic.exe'
28 - 'DOSKEY.EXE'
29 - 'sc.exe'
30 selection_redirect:
31 ParentCommandLine|contains:
32 - ' > %TEMP%\'
33 - ' > %TMP%\'
34 condition: all of selection*
35falsepositives:
36 - Unknown
37level: medium
References
Related rules
- Automated Collection Command PowerShell
- Automated Collection Command Prompt
- Recon Information for Export with PowerShell
- 7Zip Compressing Dump Files
- ADFS Database Named Pipe Connection By Uncommon Tool