triw0lf / HEARTH

A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance the field of threat hunting.
https://threathuntingcommunity.com/
152 stars 12 forks source link

Suspicious access to network shares #12

Closed Azrara closed 6 days ago

Azrara commented 1 week ago

Hunt Type 🔥

{"Flames (Hypothesis-Driven)"=>"Based on assumptions about adversary behavior or specific activities."}

HEARTH Crafter

Oussama AZRARA

Hunt Idea / Hypothesis

Adversaries may search for network shares on compromised systems to locate files of interest. Sensitive data can be gathered from remote systems via shared network drives (host-shared directories, network file servers, etc.) that are accessible from the current system before exfiltration.

MITRE ATT&CK Tactic

Collection

Implementation Notes

title: Suspicious Network Share Enumeration and Access id: xxxxx status: test description: Detects commands used for network share enumeration and correlates with Event ID 5140 for access to shared resources. author: Your Name date: 2024/11/14 tags:

Search Tags

collection #DatafromNetworkSharedDrive

Value and Impact

Hunting for adversarial activity involving network share exploration on compromised systems is crucial for detecting potential data theft early. By monitoring access to shared network drives and tracking unusual usage of command shell functions, defenders can identify attempts to locate and collect sensitive data before it is exfiltrated.

Knowledge Base

DrTerdnugget commented 6 days ago

Submission approved! Nice work! Don't forget to make a pull request to add your name to the list to get your official Contributor status on the repo here:

https://github.com/triw0lf/HEARTH/blob/main/Keepers/Contributors.md