DCOM Lateral Movement via ShellWindows/ShellBrowserWindow
This analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.
This detection identifies the abuse of Distributed Component Object Model (DCOM) for lateral movement within a Windows environment. DCOM allows software components to communicate across a network, and attackers may leverage it to execute commands remotely. This rule specifically focuses on the use of ShellBrowserWindow or ShellWindows Application COM objects as the launching point for these remote commands. The technique enables stealthy lateral movement, as it leverages legitimate Windows functionality. This activity is detected by identifying incoming TCP connections on high ports associated with explorer.exe spawning child processes, which are indicative of DCOM abuse. The rule is designed to detect this behavior and alert security teams to potential unauthorized lateral movement attempts.
Attack Chain
- An attacker gains initial access to a compromised host within the network.
- The attacker uses DCOM to initiate a connection to a target host.
- The DCOM connection is established to the target host via high TCP ports (above 49151).
- The
explorer.exeprocess on the target host receives the DCOM connection. - The attacker uses ShellBrowserWindow or ShellWindows COM objects to execute commands.
explorer.exespawns a child process to execute the attacker-supplied command.- The spawned process performs malicious actions, such as reconnaissance or further lateral movement.
Impact
Successful exploitation allows attackers to execute arbitrary commands on the target system, leading to potential data exfiltration, system compromise, and further lateral movement within the network. This can result in significant damage, including data breaches, financial losses, and reputational harm. The DCOM protocol is commonly used in many Windows environments, so this technique could be broadly applicable across many victim organizations.
Recommendation
- Deploy the Sigma rule “DCOM Lateral Movement with Explorer.exe” to your SIEM and tune for your environment to detect suspicious process creations spawned by explorer.exe.
- Enable Sysmon Event ID 3 (Network Connection) and Event ID 1 (Process Creation) logging to ensure the required data is available for the Sigma rule to function correctly.
- Review network activity for incoming TCP connections to high ports (49151+) associated with
explorer.exe, as highlighted in the “Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows” detection. - Investigate any unusual or unexpected child processes spawned by
explorer.exe, as detected by the Sigma rule.
Detection coverage 2
DCOM Lateral Movement with Explorer.exe
mediumDetects DCOM lateral movement by identifying explorer.exe spawning suspicious child processes after an incoming network connection on high ports.
Suspicious Explorer.exe Child Processes
mediumDetects suspicious child processes of explorer.exe which may indicate lateral movement via DCOM
Detection queries are kept inside the platform. Get full rules →