""ET EXPLOIT CreateService via SMB to Reset-ComputerMachinePassword - Observed Post Zerologon Activity""

SID: 2035285

Revision: 2

Class Type: attempted-admin

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Server, created_at 2022_02_24, deployment Internet, performance_impact Low, signature_severity Major, updated_at 2022_02_25

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: 445

Flow: established,to_server

Contents:

  • Value: "SMB" Depth: 8

  • Value: "|09 00|"

  • Value: "|05 00 00|"

  • Value: "|0c 00|"

  • Value: "|00|R|00|e|00|s|00|e|00|t|00|-|00|C|00|o|00|m|00|p|00|u|00|t|00|e|00|r|00|M|00|a|00|c|00|h|00|i|00|n|00|e|00|P|00|a|00|s|00|s|00|w|00|o|00|r|00|d|00|"

Within: 2

PCRE:

Special Options:

  • nocase

source