Windows SMB create remote file admin share

This rule is part of a beta feature. To learn more, contact Support.

Goal

Detects when a non-machine account creates files on remote administrative shares (C$).

Strategy

This detection monitors Windows event logs for network share access events (Event ID 5145) targeting administrative shares with write access permissions. The detection specifically looks for access to C$ shares with an access mask of 0x2 (write data) while filtering out machine account activity.

Administrative shares like C$ are hidden network shares that provide full access to the system drive. They are typically used by administrators for legitimate system management but are also frequently targeted by attackers for lateral movement. By monitoring for non-machine accounts writing files to these shares, Datadog detects potential malicious file deployment across a network.

Triage & Response

  • Identify the {{host}} where the administrative share access occurred.
  • Determine which user account performed the file creation by reviewing the event details.
  • Examine what files were created on the administrative share and assess their content.
  • Check if the user account has legitimate administrative rights and business justification.
  • Review authentication logs for the account to identify any suspicious logon activities.
  • Examine process creation logs on both the source and destination systems.
  • Isolate affected systems and remove suspicious files if unauthorized activity is confirmed.