Windows CrackMapExec execution patterns

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects command line patterns associated with CrackMapExec execution, a post-exploitation tool commonly used for lateral movement within Windows environments.

Strategy

This rule monitors Windows event logs for specific command line patterns that are characteristic of CrackMapExec usage. The detection focuses on distinctive command execution patterns commonly employed by CrackMapExec when it executes commands on remote systems via Windows Management Instrumentation (WMI), scheduled tasks, or PowerShell. These command structures are specifically designed to capture the output of executed commands and return it to the attacker while minimizing user visibility.

Triage & Response

  • Examine the full command line content to understand what actions were executed on {{host}}.
  • Analyze the context of the execution, including the user account that initiated the command and the process ancestry.
  • Review network connections established around the time of execution to identify potential lateral movement attempts.
  • Check for other indicators of compromise such as suspicious PowerShell scripts, unexpected scheduled tasks, or unusual WMI operations.
  • Investigate which systems the affected host communicated with around the time of detection.