LoFP LoFP / t1033

t1033

TitleTags
admin activity
administrator may execute this commandline tool for auditing purposes. filter as needed.
administrator or network operator can use this application for automation purposes. please update the filter macros to remove false positives.
administrators or power users may use this command for troubleshooting.
administrators or power users may use this command for troubleshooting. filter as needed.
administrators or power users may use this powershell commandlet for troubleshooting.
commonly used by administrators for troubleshooting
dministrator may execute this commandline tool for auditing purposes. filter as needed.
false positives will be present based on many factors. tune the correlation as needed to reduce too many triggers.
legitimate admin scripts may use the same technique, it's better to exclude specific computers or users who execute these commands or scripts often
legitimate administration activities
legitimate administrator or user enumerates local users for legitimate reason
legitimate powershell scripts
legitimate powershell scripts that make use of these functions.
monitoring activity
network administrator can use this command tool to audit rdp access of user in specific network or host.
powershell and windows command shell are often observed as legit child processes of the jetbrains teamcity service and may require further tuning.
programs that use the same command line flags
scripts and administrative tools used in the monitored environment
security testing tools and frameworks may run this command. some normal use of this command may originate from automation tools and frameworks.
some normal use of this program, at varying levels of frequency, may originate from scripts, automation tools and frameworks. usage by non-engineers and ordinary users is unusual.
the combination of these commands is unlikely to occur in a production environment. any matches should be investigated.
there is a potential for false positives if the \"id\", \"whoami\", \"capsh\", \"getcap\", or \"lsns\" commands are used for legitimate purposes, such as debugging or troubleshooting. for example, an operator may use the \"id\" command to verify the identity of the current user, or the \"whoami\" command to verify the current user. it is important to investigate any alerts generated by this rule to determine if they are indicative of malicious activity or part of legitimate container activity.
uncommon user command activity can be due to an engineer logging onto a server instance in order to perform manual troubleshooting or reconfiguration.
unknown
unlikely
verify whether the user identity should be using the sts getcalleridentity api. if known behavior is causing false positives, it can be exempted from the rule.