
Rule Info
Name
Possible Lateral Movement via WinRS
Author
Swachchhanda Shrawan Poudel (Nextron Systems)
Description
Detects potential lateral movement attempts through WinRS (Windows Remote Shell) where winrshost.exe spawns suspicious child processes like cmd.exe, powershell.exe, or other script interpreters.
This pattern may indicate unauthorized remote command execution or administrative activities.
WinRS is a legitimate Windows Remote Management tool but is commonly abused for lateral movement.
Date
2025-03-14 00:00:00
Modified
None
Id
bb7421be-4f23-4eeb-a603-1bbec62bed32
Tags
attack.lateral-movement attack.t1021.006
Type
Nextron Sigma feed only (private)