LoFP LoFP / t1566.002

t1566.002

TitleTags
administrators that submit known phishing training exercises.
false positives are not expected with this analytic, since it is a hunting analytic. it is meant to show the use of asr rules and how they can be used to detect malicious activity.
in most organizations, device code authentication will be used to access common microsoft service but it may be legitimate for others. filter as needed.
legitimate users may have to use ssm to perform actions against machines in the cloud to update or maintain them
there are legitimate uses of ssm to send commands to ec2 instances
this detection should yield little or no false positive results. it is uncommon for lnk files to be executed from temporary or user directories.