Suspicious Group And Account Reconnaissance Activity Using Net.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\net.exe,\net1.exe" OR ORIGINALFILENAME = "net.exe,net1.exe") AND (((COMMANDLINE contains " group , localgroup " AND COMMANDLINE contains "domain admins, administrator, administrateur,enterprise admins,Exchange Trusted Subsystem,Remote Desktop Users,Utilisateurs du Bureau à distance,Usuarios de escritorio remoto, /do") AND COMMANDLINE notcontains " /add") OR (COMMANDLINE contains " accounts " AND COMMANDLINE contains " /do")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

Florian Roth (Nextron Systems), omkar72, @svch0st, Nasreddine Bencherchali (Nextron Systems)