title: Net.exe Execution author: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements) date: 2019/01/16 description: Detects execution of Net.exe, whether suspicious or benign. detection: SELECTION_1: EventID: 1 SELECTION_2: Image: - '*\net.exe' - '*\net1.exe' SELECTION_3: CommandLine: - '* group*' - '* localgroup*' - '* user*' - '* view*' - '* share*' - '* accounts*' - '* stop *' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) falsepositives: - Will need to be tuned. If using Splunk, I recommend | stats count by Computer,CommandLine following the search for easy hunting by computer/CommandLine. fields: - ComputerName - User - CommandLine - ParentCommandLine id: 183e7ea8-ac4b-4c23-9aec-b3dac4e401ac level: low logsource: category: process_creation product: windows modified: 2020/11/28 references: - https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ - https://eqllib.readthedocs.io/en/latest/analytics/4d2e7fc1-af0b-4915-89aa-03d25ba7805e.html - https://eqllib.readthedocs.io/en/latest/analytics/e61f557c-a9d0-4c25-ab5b-bbc46bb24deb.html - https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html status: experimental tags: - attack.discovery - attack.t1049 - attack.t1018 - attack.t1135 - attack.t1201 - attack.t1069.001 - attack.t1069.002 - attack.t1087.001 - attack.t1087.002 - attack.lateral_movement - attack.t1021.002 - attack.t1077 - attack.s0039 ruletype: SIGMA