Rules Contributing to Remote Task Creation via ATSVC Named Pipe Alert
The following rules detect suspicious SMB traffic accessing ATSVC named pipes. Any one or more of these will trigger the Remote Task Creation via ATSVC Named Pipe Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Remote Task Creation via ATSVC Named Pipe |
Detects remote task creation via at.exe or API interacting with ATSVC namedpipe More details
Rule IDQuery{'selection': {'appid_name': 'smb', 'metadata|contains|all': ['IPC$', 'atsvc']}, 'condition': 'selection'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|