Windows SMB create remote file admin share

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when a non-machine account creates files on remote administrative shares (C$).

Strategy

This detection monitors Windows event logs for network share access events (Event ID 5145) targeting administrative shares with write access permissions. The detection specifically looks for access to C$ shares with an access mask of 0x2 (write data) while filtering out machine account activity.

Administrative shares like C$ are hidden network shares that provide full access to the system drive. They are typically used by administrators for legitimate system management but are also frequently targeted by attackers for lateral movement. By monitoring for non-machine accounts writing files to these shares, Datadog detects potential malicious file deployment across a network.

Triage & Response

  • Identify the {{host}} where the administrative share access occurred.
  • Determine which user account performed the file creation by reviewing the event details.
  • Examine what files were created on the administrative share and assess their content.
  • Check if the user account has legitimate administrative rights and business justification.
  • Review authentication logs for the account to identify any suspicious logon activities.
  • Examine process creation logs on both the source and destination systems.
  • Isolate affected systems and remove suspicious files if unauthorized activity is confirmed.