Detectionhightest

Remote DCOM/WMI Lateral Movement

Detects remote RPC calls that performs remote DCOM operations. These could be abused for lateral movement via DCOM or WMI.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Sagie Dulce, Dekel PazCreated Sat Jan 0168050b10-e477-4377-a99b-3721b422d6efapplication
Log Source
rpc_firewallapplication
Productrpc_firewall← raw: rpc_firewall
Categoryapplication← raw: application

Definition

Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:367abb81-9844-35f1-ad32-98f038001003

Detection Logic
Detection Logic1 selector
detection:
    selection:
        EventLog: RPCFW
        EventID: 3
        InterfaceUuid:
            - 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57
            - 99fcfec4-5260-101b-bbcb-00aa0021347a
            - 000001a0-0000-0000-c000-000000000046
            - 00000131-0000-0000-c000-000000000046
            - 00000143-0000-0000-c000-000000000046
            - 00000000-0000-0000-c000-000000000046
    condition: selection
False Positives

Some administrative tasks on remote host

Rule Metadata
Rule ID
68050b10-e477-4377-a99b-3721b422d6ef
Status
test
Level
high
Type
Detection
Created
Sat Jan 01
Path
rules/application/rpc_firewall/rpc_firewall_remote_dcom_or_wmi.yml
Raw Tags
attack.lateral-movementattack.executionattack.t1021.003attack.t1047
View on GitHub