""ET EXPLOIT CreateService via SMB to Reset-ComputerMachinePassword - Observed Post Zerologon Activity""
SID: 2035285
Revision: 2
Class Type: attempted-admin
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Server, created_at 2022_02_24, deployment Internet, performance_impact Low, signature_severity Major, updated_at 2022_02_25
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: 445
Flow: established,to_server
Contents:
-
Value: "SMB" Depth: 8
-
Value: "|09 00|"
-
Value: "|05 00 00|"
-
Value: "|0c 00|"
-
Value: "|00|R|00|e|00|s|00|e|00|t|00|-|00|C|00|o|00|m|00|p|00|u|00|t|00|e|00|r|00|M|00|a|00|c|00|h|00|i|00|n|00|e|00|P|00|a|00|s|00|s|00|w|00|o|00|r|00|d|00|"
Within: 2
PCRE:
Special Options:
- nocase