Exploitation of Remote Services – multi-platform lateral movement detection

ID: DET0118
Domains: Enterprise
Analytics: AN0327, AN0328, AN0329, AN0330
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0327

Correlates inbound network access to remote service ports (e.g., SMB/RPC 445/135, RDP 3389, WinRM 5985/5986) with near-time instability in the target service (crash, abnormal restart), suspicious child process creation under the service, and post-access lateral-movement behaviors. The chain indicates likely exploitation rather than normal administration.

Log Sources
Data Component Name Channel
Application Log Content (DC0038) WinEventLog:System EventCode=7031,7034,1000,1001
Process Creation (DC0032) WinEventLog:Sysmon EventCode=1
Network Connection Creation (DC0082) WinEventLog:Sysmon EventCode=3
Module Load (DC0016) WinEventLog:Sysmon EventCode=7
Process Access (DC0035) WinEventLog:Sysmon EventCode=10
File Creation (DC0039) WinEventLog:Sysmon EventCode=11
Network Traffic Content (DC0085) NSM:Flow Inbound connections to 445, 3389, 5985-5986 with high error/connection-reset rate, followed by new outbound sessions from the same host to internal assets within short interval.
Mutable Elements
Field Description
ServicePortSet List of monitored service ports (default: 445,135,3389,5985,5986,1433,3306).
TimeWindow Correlation window between inbound access and crash/child-process (default: 10 minutes).
AllowedAdminCIDRs Known management networks to suppress benign admin traffic.
MinConnErrorRate Percent of failed/aborted connections to treat as anomalous (default: 30%).

AN0328

Links inbound network access to SSHD/SMB/NFS/Databases or custom daemons with subsequent daemon crash/restart, core dump, or spawning of shells/reverse shells from the service context, indicating remote exploitation.

Log Sources
Data Component Name Channel
Application Log Content (DC0038) linux:syslog kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc.
Process Creation (DC0032) auditd:SYSCALL execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity.
Network Traffic Content (DC0085) NSM:Flow Inbound connections to monitored service ports from external or unusual internal sources; rapid follow-on lateral connections from the same host.
Mutable Elements
Field Description
ServiceNames Linux daemons to watch (sshd, smbd, nfsd, httpd/nginx, mysqld, postgres, redis).
CoreDumpPaths Paths indicating crash artifacts (/var/crash, /var/lib/systemd/coredump).
ShellSpawnAllowlist Paths/users allowed to spawn shells from services (default: empty).
TimeWindow Correlation window (default 10m).

AN0329

Detects exploitation targeting ESXi/vCenter by correlating attempts to reach known exploitable endpoints (OpenSLP 427, CIM 5989, Hostd/Vpxa HTTPS 443, ESXi SOAP) with vmkernel/hostd crashes, unexpected hostd/vpxa restarts, or new reverse/outbound connections from ESXi host/vCenter to internal assets.

Log Sources
Data Component Name Channel
Application Log Content (DC0038) esxi:hostd Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log.
Network Traffic Content (DC0085) NSM:Flow Inbound to tcp/427 (OpenSLP), tcp/443 (vSphere APIs), tcp/902, tcp/5989 followed by new unexpected outbound sessions from the ESXi/vCenter host.
Mutable Elements
Field Description
ESXiServicePorts 427, 443, 902, 5989; modify per version/hardening.
MgmtCIDRs Legit management networks for vCenter/ESXi.
RestartKeywords Crash/restart patterns to match in logs.

AN0330

Ties inbound access to exposed services (ARD/VNC 5900, SSH 22, ScreenSharing, web services) with process crashes in unified logs and abnormal child processes spawned under those services (e.g., bash, curl) to indicate exploitation.

Log Sources
Data Component Name Channel
Application Log Content (DC0038) macos:unifiedlog process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons.
Process Creation (DC0032) macos:osquery parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes.
Network Traffic Content (DC0085) NSM:Flow Inbound to 22/5900/8080 and follow-on internal connections.
Mutable Elements
Field Description
ServicePortSet 22, 5900, 8080/8443 by default.
AllowedAdmins MDM/jump-host IPs allowed to manage endpoints.
TimeWindow Default: 10 minutes.