<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Threat Hunting with the Open Lateral Movement Ruleset for Suricata

In November of 2022 we announced a Suricata ruleset specifically focused on detecting lateral movement in Microsoft Windows environments. In this article, we explain how that ruleset, as a part of SELKS or any Suricata installation, can be used to detect living off the land techniques. It is important to note that this example demonstrates a feature of SELKS, our open-source Suricata intrusion detection/prevention system (IDS/IPS), network security monitoring system (NSM), and threat hunting implementation. 

A Powerful Source of Threat Hunting Data

Let’s start with the basics so we don’t miss out on anything important. 

One of the many powerful features of Suricata is that it can create protocol and transaction logs even in the absence of alerts. These logs include flow, anomaly, alert, protocol, and file transaction logs, plus file extraction and packet capture (PCAP). 

 

Here is a full list and details of what those logs and transactions look like. 

What is the Open Lateral Movement Ruleset? 

With the capabilities of Suricata in mind, let’s review the open lateral movement ruleset. 

This ruleset is specifically developed for SMB Windows environments on top of Suricata 7+ capabilities and is meant to: 

  • Highlight lateral movement over SMB
  • Be used for the auditing of security policies
  • Be able to be used for incident response and digital forensics 

The detection methods of the ruleset highlight and provide traceability. For example, it could detect any sort of query or configuration change over SMB

But How?

Let’s look at an example: 

Let’s say something or someone creates a remote scheduled task (we will review others as we move alone in this article). Usually, for that purpose, the standard MS-TSCH Task Scheduler Service Remoting Protocol is used. The task can be scheduled in multiple ways, via the default windows command line or GUI tools like the Remote Server Administration Tools (RSAT) for Windows for example. 

Does a remote scheduled task instantly signal something malicious? No, not at all. However, we should investigate further because there are some important things to consider. 

Living off the Land Techniques 

Sometimes, a remote scheduled task is an indicator that a threat actor is using the default tools and privileges on a system to conduct malicious activities. With that in mind, and in the case of our example, we need to find out what or who triggered the scheduled task. If we find that it did not come from an expected location, then we know we have something to worry about. 

So, what does an event like that look like using the free, open-source lateral movement ruleset for Suricata?

The following screenshot is from SELKS, more specifically the hunt interface. The data displayed contains the alert itself, other related alerts, flow, SMB protocol logs, and a PCAP. Suricata produces all this information and correlates it by flow id by default. Please note that Suricata will produce all these logs (SMB, flow, PCAP, etc.) regardless of the presence of an alert. This is due to Suricata’s ability to function as a fully developed network security monitoring engine (NSM) that can operate regardless of rules or signatures. 

The reason this alert event was triggered is simple – it just followed the Microsoft protocol definition for creating a remote scheduled task, as we can see from the Signature tab in the screenshot below. 

Critical Lateral Config Changes Detection 

As we mentioned above, if the remote scheduled task is not coming from the expected infra management servers or locations/tools, then it would warrant further investigation. However, there can be many different interesting occurrences worth highlighting and looking into, such as driver installation, remote permissions additions, creating services, resetting passwords, etc. 

Here are some examples from the SELKS hunting interface: 

Now, if these critical configurational changes do not come from an expected source (based on the Source IP) then we would certainly have something to investigate. For example, maybe the Source IP is tracing back to end user clients rather than management infrastructure. 

So how do we filter out the critical configurational changes from all the events?

Hunting Filters to the Rescue

It’s actually is very simple! In every such alert event from Open Lateral Movement Ruleset there is a subsection from the full JSON log denoting its importance in terms of configuration activity (highlighted in bold). 

That log looks like this:  

{

  "metadata": {

    "lateral_function": [

      "SASetAccountInformation"

    ],

    "source": [

      "smb_lateral"

    ],

    "signature_severity": [

      "Critical"

    ],

    "lateral_asset": [

      "src_ip"

    ],

    "lateral_key": [

      "dcerpc.iface"

    ],

    "provider": [

      "Stamus"

    ],

    "stamus_classification": [

      "lateral"

    ],

    "updated_at": [

      "2024_02_07"

    ],

    "created_at": [

      "2022_03_23"

    ]

  },

  "signature_id": 3115117,

  "gid": 1,

  "rev": 3,

  "source": {

    "port": 50805,

    "ip": "10.136.0.69"

  },

  "severity": 3,

  "category": "",

  "target": {

    "port": 445,

    "ip": "10.136.0.64"

  },

  "action": "allowed",

  "signature": "Stamus Networks MS-TSCH service - SASec SASetAccountInformation"

}

Take note of the signature severity level. There are two options - Critical or Informational

The Critical level is used for an active configuration change – addition, deletion, adjusting permissions, creating deleting tasks, services, etc. 

The Informational is for everything else. 

 "signature_severity": [

      "Critical"

    ],

The bold section above is easily available and used as a filterset in the SELKS hunting GUI, however the exact same query can be executed in any SIEM that holds Suricata data. 

SELKS - Hunt

In the Stamus Community Edition Hunting interface, as a part of SELKS, we can see that information by selecting the filter sets from the upper right corner, typing “lateral” in the search bar, and selecting the critical lateral changes filter set: 

This results in the filter set query itself being applied to the Suricata data: 

Elasticsearch / Kibana / Splunk

In Kibana/Elasticsearch or any other SIEM, the query below can be used to highlight critical config changes done remotely over SMB: 

alert.metadata.source:smb_lateral AND alert.metadata.stamus_classification:lateral AND alert.metadata.signature_severity:critical

What Other Critical Config Changes can be Detected?

Below you will find a list of the critical configurational changes that the open lateral movement ruleset is capable of detecting via SMB. Each line/name represents the Microsoft protocol and the separate function being used (which is also part of the alert message):

  •  MS-SCMR service - RCreateServiceW
  •  MS-SCMR service - RCreateServiceA
  •  MS-SCMR service - RCreateServiceWOW64A
  •  MS-SCMR service - RCreateServiceWOW64W
  •  MS-SCMR service - RCreateWowService
  •  MS-SCMR service - RChangeServiceConfigW
  •  MS-SCMR service - RChangeServiceConfigA
  •  MS-SCMR service - RChangeServiceConfig2A
  •  MS-SCMR service - RChangeServiceConfig2W
  •  MS-SCMR service - RDeleteService
  •  MS-SCMR service - RSetServiceObjectSecurity
  •  MS-SCMR service - RSetServiceStatus
  •  MS-TSCH service - ATSvc NetrJobAdd
  •  MS-TSCH service - ATSvc NetrJobDel
  •  MS-TSCH service - SASec SASetAccountInformation
  •  MS-TSCH service - SASec SASetNSAccountInformation
  •  MS-TSCH service - ITaskSchedulerService SchRpcRegisterTask
  •  MS-TSCH service - ITaskSchedulerService SchRpcCreateFolder
  •  MS-TSCH service - ITaskSchedulerService SchRpcSetSecurity
  •  MS-TSCH service - ITaskSchedulerService SchRpcStopInstance
  •  MS-TSCH service - ITaskSchedulerService SchRpcStop
  •  MS-TSCH service - ITaskSchedulerService SchRpcRun
  •  MS-TSCH service - ITaskSchedulerService SchRpcDelete
  •  MS-TSCH service - ITaskSchedulerService SchRpcRename
  •  MS-TSCH service - ITaskSchedulerService SchRpcEnableTask
  •  MS-RRP service - BaseRegDeleteValue
  •  MS-RRP service - BaseRegFlushKey
  •  MS-RRP service - BaseRegLoadKey
  •  MS-RRP service - BaseRegReplaceKey
  •  MS-RRP service - BaseRegSaveKey
  •  MS-RRP service - BaseRegSetKeySecurity
  •  MS-RRP service - BaseRegSaveKeyEx
  •  MS-RRP service - BaseRegDeleteKeyEx
  •  MS-NRPC service - NetrServerPasswordSet
  •  MS-NRPC service - NetrDatabaseSync
  •  MS-NRPC service - NetrAccountSync
  •  MS-NRPC service - NetrServerPasswordSet2
  •  MS-NRPC service - DsrDeregisterDnsHostRecords
  •  MS-DRSUAPI service - IDL_DRSReplicaSync
  •  MS-DRSUAPI service - IDL_DRSGetNCChanges
  •  MS-DRSUAPI service - IDL_DRSUpdateRefs
  •  MS-DRSUAPI service - IDL_DRSReplicaAdd
  •  MS-DRSUAPI service - IDL_DRSReplicaDel
  •  MS-DRSUAPI service - IDL_DRSReplicaModify
  •  MS-DRSUAPI service - IDL_DRSInterDomainMove
  •  MS-DRSUAPI service - IDL_DRSRemoveDsServer
  •  MS-DRSUAPI service - IDL_DRSAddEntry
  •  MS-DRSUAPI service - IDL_DRSAddCloneDC
  •  MS-DRSUAPI service - IDL_DRSWriteNgcKey
  •  MS-DSAOP service - IDL_DSAPrepareScript
  •  MS-DSAOP service - IDL_DSAExecuteScript
  •  MS-LSAD service - LsarSetSecurityObject
  •  MS-LSAD service - LsarSetInformationPolicy
  •  MS-LSAD service - LsarCreateAccount
  •  MS-LSAD service - LsarCreateTrustedDomain
  •  MS-LSAD service - LsarAddPrivilegesToAccount
  •  MS-LSAD service - LsarRemovePrivilegesFromAccount
  •  MS-LSAD service - LsarSetSystemAccessAccount
  •  MS-LSAD service - LsarSetInformationTrustedDomain
  •  MS-LSAD service - LsarAddAccountRights
  •  MS-LSAD service - LsarRemoveAccountRights
  •  MS-LSAD service - LsarSetTrustedDomainInfo
  •  MS-LSAD service - LsarDeleteTrustedDomain
  •  MS-LSAD service - LsarSetInformationPolicy2
  •  MS-LSAD service - LsarSetTrustedDomainInfoByName
  •  MS-LSAD service - LsarCreateTrustedDomainEx
  •  MS-LSAD service - LsarSetDomainInformationPolicy
  •  MS-LSAD service - LsarCreateTrustedDomainEx2
  •  MS-LSAD service - LsarSetForestTrustInformation
  •  MS-WKST service - NetrWkstaSetInfo
  •  MS-WKST service - NetrUseAdd
  •  MS-WKST service - NetrUseDel
  •  MS-WKST service - NetrJoinDomain2
  •  MS-WKST service - NetrUnjoinDomain2
  •  MS-WKST service - NetrRenameMachineInDomain2
  •  MS-WKST service - NetrRemoveAlternateComputerName
  •  MS-WKST service - NetrSetPrimaryComputerName
  •  MS-SRVS service - NetrSessionDel
  •  MS-SRVS service - NetrShareAdd
  •  MS-SRVS service - NetrShareDel
  •  MS-SRVS service - NetrServerSetInfo
  •  MS-SRVS service - NetrServerTransportDel
  •  MS-SRVS service - NetrShareDelStart
  •  MS-SRVS service - NetrShareDelCommit
  •  MS-SRVS service - NetrpSetFileSecurity
  •  MS-SRVS service - NetrDfsCreateLocalPartition
  •  MS-SRVS service - NetrDfsDeleteLocalPartition
  •  MS-SRVS service - NetrDfsSetLocalVolumeState
  •  MS-SRVS service - NetrDfsDeleteExitPoint
  •  MS-SRVS service - NetrDfsModifyPrefix
  •  MS-SRVS service - NetrServerAliasDel
  •  MS-FASP service - RRPC_FWSetGlobalConfig
  •  MS-FASP service - RRPC_FWAddFirewallRule
  •  MS-FASP service - RRPC_FWSetFirewallRule
  •  MS-FASP service - RRPC_FWDeleteFirewallRule
  •  MS-FASP service - RRPC_FWDeleteAllFirewallRules
  •  MS-FASP service - RRPC_FWSetConfig
  •  MS-FASP service - RRPC_FWAddConnectionSecurityRule
  •  MS-FASP service - RRPC_FWSetConnectionSecurityRule
  •  MS-FASP service - RRPC_FWDeleteConnectionSecurityRule
  •  MS-FASP service - RRPC_FWDeleteAllConnectionSecurityRules
  •  MS-FASP service - RRPC_FWAddAuthenticationSet
  •  MS-FASP service - RRPC_FWSetAuthenticationSet
  •  MS-FASP service - RRPC_FWDeleteAuthenticationSet
  •  MS-FASP service - RRPC_FWDeleteAllAuthenticationSets
  •  MS-FASP service - RRPC_FWSetCryptoSet
  •  MS-FASP service - RRPC_FWDeleteCryptoSet
  •  MS-FASP service - RRPC_FWDeleteAllCryptoSets
  •  MS-FASP service - RRPC_FWDeletePhase1SAs
  •  MS-FASP service - RRPC_FWSetMainModeRule
  •  MS-FASP service - RRPC_FWDeleteMainModeRule
  •  MS-FASP service - RRPC_FWDeleteAllMainModeRules
  •  MS-FASP service - RRPC_FWAddFirewallRule2_10
  •  MS-FASP service - RRPC_FWSetFirewallRule2_10
  •  MS-FASP service - RRPC_FWSetConnectionSecurityRule2_10
  •  MS-FASP service - RRPC_FWSetAuthenticationSet2_10
  •  MS-FASP service - RRPC_FWSetCryptoSet2_10
  •  MS-FASP service - RRPC_FWSetConnectionSecurityRule2_20
  •  MS-FASP service - RRPC_FWAddAuthenticationSet2_20
  •  MS-FASP service - RRPC_FWSetAuthenticationSet2_20
  •  MS-FASP service - RRPC_FWAddFirewallRule2_20
  •  MS-FASP service - RRPC_FWSetFirewallRule2_20
  •  MS-FASP service - RRPC_FWAddFirewallRule2_24
  •  MS-FASP service - RRPC_FWSetFirewallRule2_24
  •  MS-FASP service - RRPC_FWAddFirewallRule2_25
  •  MS-FASP service - RRPC_FWSetFirewallRule2_25
  •  MS-FASP service - RRPC_FWAddFirewallRule2_26
  •  MS-FASP service - RRPC_FWSetFirewallRule2_26
  •  MS-FASP service - RRPC_FWAddFirewallRule2_31
  •  MS-FASP service - RRPC_FWSetFirewallRule2_31
  •  MS-RPRN service - RpcAddPrinter
  •  MS-RPRN service - RpcSetPrinter
  •  MS-RPRN service - RpcAddPrinterDriver
  •  MS-RPRN service - RpcDeletePrinterDriver
  •  MS-RPRN service - RpcSetPrinterData
  •  MS-RPRN service - RpcResetPrinter
  •  MS-RPRN service - RpcDeletePrinterDriverEx
  •  MS-RPRN service - RpcAddPrinterDriverEx

Where to Get Support

For more information or active online discussion please join our community on the Stamus Networks Discord server: https://discord.gg/e6GQKGS5HN 

Additional Information

The following resources can provide additional information:

Please note this this example is with regards to the Open Lateral Detection Ruleset with SELKS or any stable Suricata installation. The Stamus Security Platform (SSP) offers auto escalation, based on organizational context and automated triaging that is more suitable for the Enterprise level deployments. 

To stay updated with new blog posts from Stamus Networks, also make sure to subscribe to the Stamus Networks blog, follow us on Twitter, LinkedIn, and Facebook, or join our Discord.

Peter Manev

Peter Manev is the co-founder and chief strategy officer (CSO) at Stamus Networks. He is a member of the executive team at Open Network Security Foundation (OISF). Peter has over 15 years of experience in the IT industry, including enterprise-level IT security practice. He is a passionate user, developer, and explorer of innovative open-source security software, and he is responsible for training as well as quality assurance and testing on the development team of Suricata – the open-source threat detection engine. Peter is a regular speaker and educator on open-source security, threat hunting, and network security at conferences and live-fire cyber exercises, such as Crossed Swords, DeepSec, Troopers, DefCon, RSA, Suricon, SharkFest, and others. Peter resides in Gothenburg, Sweden.

Schedule a Demo of Stamus Security Platform

REQUEST A DEMO

Related posts

Uncovered: SSP Identifies Massive Breach During Evaluation

For many organizations considering Network Detection and Response (NDR), one of the most valuable...

Uncovered with Stamus Security Platform: Lateral Active Exploits

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Stamus Security Platform: DarkGate Malware as a Service (MaaS)

In this series of articles, we explore a set of use cases that we have encountered in real-world...