NetScan Share Enumeration Write Access Check
Detects the creation of unique artifacts created by SoftPerfect NetScan when performing write-access checking on enumerated network shares
Sigma rule (View on GitHub)
1title: NetScan Share Enumeration Write Access Check
2id: 8a0d153f-b4e4-4ea7-9335-892dfbe17221
3status: Experimental
4description: Detects the creation of unique artifacts created by SoftPerfect NetScan when performing write-access checking on enumerated network shares
5author: "@pcscout, @TheDFIRReport"
6date: 2024/01/27
7references:
8 - https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
9 - https://www.softperfect.com.cach3.com/board/read.php%3F12,10134,12202.html
10 - https://content.vectra.ai/hubfs/downloadable-assets/RansomOps-Post-Incident-Report.pdf
11tags:
12 - attack.discovery
13 - attack.t1135
14 - dist.public
15logsource:
16 product: windows
17 service: security
18detection:
19 selection:
20 EventID: 5145
21 RelativeTargetName: 'delete.me'
22 AccessMask:
23 - '0x2'
24 - '0x130196'
25 ObjectType: File
26 condition: selection
27falsepositives:
28 - Unknown
29level: medium
References
Related rules
- Conhost Suspicious Command Execution
- Domain User Enumeration Network Recon 01
- Suspicious Command Arguments from Explorer or Wermgr
- SocGholish NLTest Domain Trust Enumeration (RedCanary Threat Detection Report)
- SocGholish Script File Whoami Output to File (RedCanary Threat Detection Report)