Closed Azrara closed 6 days ago
Submission approved! Nice work! Don't forget to make a pull request to add your name to the list to get your official Contributor status on the repo here:
https://github.com/triw0lf/HEARTH/blob/main/Keepers/Contributors.md
Hunt Type 🔥
{"Flames (Hypothesis-Driven)"=>"Based on assumptions about adversary behavior or specific activities."}
HEARTH Crafter
Oussama AZRARA
Hunt Idea / Hypothesis
Adversaries may search for network shares on compromised systems to locate files of interest. Sensitive data can be gathered from remote systems via shared network drives (host-shared directories, network file servers, etc.) that are accessible from the current system before exfiltration.
MITRE ATT&CK Tactic
Collection
Implementation Notes
title: Suspicious Network Share Enumeration and Access id: xxxxx status: test description: Detects commands used for network share enumeration and correlates with Event ID 5140 for access to shared resources. author: Your Name date: 2024/11/14 tags:
Search Tags
collection #DatafromNetworkSharedDrive
Value and Impact
Hunting for adversarial activity involving network share exploration on compromised systems is crucial for detecting potential data theft early. By monitoring access to shared network drives and tracking unusual usage of command shell functions, defenders can identify attempts to locate and collect sensitive data before it is exfiltrated.
Knowledge Base