Skip to content
Threat Feed
high advisory

Detection of Attacker Tools on Endpoints

This analytic detects the execution of attacker tools used for unauthorized access, network scanning, privilege escalation, password dumping, or data exfiltration, based on process activity data from EDR agents and focusing on known attacker tool names.

This detection focuses on identifying the execution of tools commonly used by cybercriminals on endpoints. The detection leverages process activity data from Endpoint Detection and Response (EDR) agents, examining process names against a list of known attacker tools. The goal is to provide an early warning system for potential security incidents such as unauthorized access, data theft, or further network compromise. The analytic considers tools used for network scanning, privilege escalation, and password dumping. The detection logic relies on the “attacker_tools” lookup table to match observed process names against known malicious tools.

Attack Chain

  1. An attacker gains initial access to a system (e.g., via phishing or exploiting a vulnerability).
  2. The attacker executes a reconnaissance tool (e.g., nmap, masscan) to scan the local network for potential targets and open ports.
  3. The attacker uses a privilege escalation tool (e.g., a Metasploit module, or a publicly available exploit) to gain elevated privileges on the compromised system.
  4. The attacker executes a credential dumping tool (e.g., mimikatz) to extract passwords and other credentials from memory.
  5. The attacker uses lateral movement techniques (e.g., pass-the-hash, pass-the-ticket) to move to other systems on the network.
  6. The attacker deploys additional attacker tools on other endpoints within the network.
  7. The attacker uses data exfiltration tools (e.g., rsync, scp) or techniques (e.g., steganography) to steal sensitive data.
  8. The attacker achieves their final objective, such as data theft, ransomware deployment, or system disruption.

Impact

A successful attack involving the execution of attacker tools on endpoints can lead to severe consequences. This includes unauthorized access to sensitive data, data theft, further network compromise, and potential ransomware deployment. Organizations may experience financial losses, reputational damage, and legal liabilities. The impact extends to compromised Windows hosts, as well as potential lateral movement leading to compromise of critical assets.

Recommendation

  • Ingest process GUID, process name, parent process, and command-line execution logs from EDR agents into Splunk as outlined in the “how_to_implement” section of the content.
  • Utilize the Splunk Common Information Model (CIM) to normalize field names and speed up data modeling to properly map data to the Endpoint data model as outlined in the “how_to_implement” section of the content.
  • Deploy the Sigma rule “Attacker Tools Execution Detected” to identify the execution of known attacker tools based on process name, tuning the “attacker_tools” lookup for your environment.
  • Add administrator accounts to the filter macro attacker_tools_on_endpoint_filter to reduce false positives, as outlined in the “known_false_positives” section of the content.
  • Investigate detections triggered by this analytic, focusing on the processes identified and their parent processes, to determine the scope and severity of the potential security incident as described in the “description” field.

Detection coverage 2

Attacker Tools Execution Detected

high

Detects the execution of known attacker tools based on process name.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Attacker Tools Execution Detected - CommandLine

high

Detects the execution of known attacker tools based on process command line.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →