Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- https://401trg.com/an-introduction-to-smb-for-network-security-analysts/
- 10/09/2017-10:13:19.576942 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:13:19.577731 [**] [1:2025699:2] ET POLICY SMB Executable File Transfer [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:13:19.577892 [**] [1:2025699:2] ET POLICY SMB Executable File Transfer [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:13:19.577892 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:10:39.125469 [**] [1:2025703:2] ET POLICY SMB2 NT Create AndX Request For an Executable File In a Temp Directory [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.125469 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.129767 [**] [1:2025699:2] ET POLICY SMB Executable File Transfer [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.129951 [**] [1:2025699:2] ET POLICY SMB Executable File Transfer [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:13:19.578927 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:13:19.730587 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:13:20.015889 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:44:39.268789 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49282 -> 192.168.10.10:445
- 10/09/2017-10:44:39.269739 [**] [1:2025699:2] ET POLICY SMB Executable File Transfer [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49282 -> 192.168.10.10:445
- 10/09/2017-10:44:39.270132 [**] [1:2025699:2] ET POLICY SMB Executable File Transfer [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49282 -> 192.168.10.10:445
- 10/09/2017-10:44:39.270132 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49282 -> 192.168.10.10:445
- 10/09/2017-10:10:39.134639 [**] [1:2025703:2] ET POLICY SMB2 NT Create AndX Request For an Executable File In a Temp Directory [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.134639 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.135097 [**] [1:2025703:2] ET POLICY SMB2 NT Create AndX Request For an Executable File In a Temp Directory [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.135097 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.136184 [**] [1:2025703:2] ET POLICY SMB2 NT Create AndX Request For an Executable File In a Temp Directory [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/09/2017-10:10:39.136184 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49238 -> 192.168.10.30:445
- 10/25/2017-13:18:37.882167 [**] [1:2025719:2] ET POLICY Powershell Activity Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.882167 [**] [1:2025720:3] ET POLICY Powershell Command With Hidden Window Argument Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.882167 [**] [1:2025722:2] ET POLICY Powershell Command With No Profile Argument Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.884143 [**] [1:2025719:2] ET POLICY Powershell Activity Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.884143 [**] [1:2025720:3] ET POLICY Powershell Command With Hidden Window Argument Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.884143 [**] [1:2025722:2] ET POLICY Powershell Command With No Profile Argument Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.886078 [**] [1:2025719:2] ET POLICY Powershell Activity Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.886078 [**] [1:2025720:3] ET POLICY Powershell Command With Hidden Window Argument Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/25/2017-13:18:37.886078 [**] [1:2025722:2] ET POLICY Powershell Command With No Profile Argument Over SMB - Likely Lateral Movement [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.10.50:46785 -> 192.168.10.31:445
- 10/09/2017-10:44:39.271903 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49282 -> 192.168.10.10:445
- 10/09/2017-10:44:39.272266 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49282 -> 192.168.10.10:445
- 10/20/2017-12:43:22.993206 [**] [1:2025714:2] ET POLICY SMB Remote AT Scheduled Job Pipe Creation [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.30:445 -> 192.168.10.31:49266
- 10/09/2017-10:13:21.476599 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
- 10/09/2017-10:45:00.419392 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49285 -> 192.168.10.10:445
- 10/09/2017-10:45:00.432779 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49285 -> 192.168.10.10:445
- 10/09/2017-10:45:00.484285 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49285 -> 192.168.10.10:445
- 10/09/2017-10:45:00.495069 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49285 -> 192.168.10.10:445
- 10/09/2017-10:45:00.496785 [**] [1:2025701:2] ET POLICY SMB2 NT Create AndX Request For an Executable File [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.168.10.31:49285 -> 192.168.10.10:445
- 10/09/2017-10:45:10.699181 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49285 -> 192.168.10.10:445
- 10/09/2017-10:45:27.729133 [**] [1:2010781:3] ET POLICY PsExec service created [**] [Classification: A suspicious filename was detected] [Priority: 2] {TCP} 192.168.10.31:49239 -> 192.168.10.30:445
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement