S0357 Impacket SecretdumpSMB2
S0357 - Impacket Secretdump with SMB2¶
DESCRIPTION¶
Actor may use Impacket’s wmiexec, which redirects output to a file within the victim host’s ADMIN$ share (C:\Windows) containing an epoch timestamp in its name.
Example:
cmd.exe /Q /c dir 1> \127.0.0.1\ADMIN$__1684944005.9400265 2>&1
Related
Volt Typhoon activity
Reference:
https://www.cyber.gov.au/about-us/advisories/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-277a
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Attacker%20Tools%20Threat%20Protection%20Essentials/Hunting%20Queries/PotentialImpacketExecution.yaml
ATT&CK TACTICS¶
Data Source(s): Process, Command
SENTINEL RULE QUERY¶
Triage¶
- Identify user/service triggering the activity
- Validate .tmp file names and location
- Investigate further if the activity is expected and approved
VERSION¶
Version 1.1 (date: 26/10/2023)