Software Deployment Tools
Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network. Configuration management and software deployment applications — including Microsoft SCCM/ConfigMgr, HCL BigFix, PDQ Deploy, Symantec Altiris, Microsoft Intune, Azure Arc, AWS Systems Manager (SSM), and RAdmin — are widely deployed for enterprise endpoint management. Adversaries who compromise or abuse these platforms gain the ability to execute arbitrary commands across all enrolled systems simultaneously, often running as SYSTEM or with elevated privileges. Real-world abuse includes APT32 compromising McAfee ePO for malware distribution, Sandworm Team using RemoteExec for agentless lateral movement, Medusa Group deploying ransomware payloads via BigFix and PDQ Deploy, and Threat Group-1314 abusing Altiris for network-wide propagation.
let DeploymentAgents = dynamic([
"ccmexec.exe",
"ccmsetup.exe",
"besclient.exe",
"besservice.exe",
"PDQDeployRunner.exe",
"PDQDeploy.exe",
"AeXNSAgent.exe",
"AeXSWDSvc.exe",
"IntuneManagementExtension.exe",
"amazon-ssm-agent.exe",
"RemoteExec.exe",
"radmin.exe",
"r_server.exe"
]);
let SuspiciousChildren = dynamic([
"cmd.exe", "powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe",
"mshta.exe", "regsvr32.exe", "rundll32.exe", "certutil.exe", "bitsadmin.exe",
"wmic.exe", "net.exe", "net1.exe", "sc.exe", "schtasks.exe",
"reg.exe", "whoami.exe", "nltest.exe", "at.exe"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName has_any (DeploymentAgents)
| where FileName has_any (SuspiciousChildren)
| extend CredentialAccess = ProcessCommandLine has_any ("lsass", "procdump", "mimikatz", "sekurlsa", "comsvcs", "ntds.dit", "MiniDump")
| extend LateralMovement = ProcessCommandLine has_any ("psexec", "wmic /node", "net use", "xcopy", "robocopy", "Enter-PSSession")
| extend PersistenceAttempt = ProcessCommandLine has_any ("schtasks /create", "sc create", "reg add", "localgroup administrators", "CurrentVersion\\Run", "startup")
| extend DownloadAttempt = ProcessCommandLine has_any ("downloadstring", "downloadfile", "invoke-webrequest", "iwr ", "certutil -urlcache", "bitsadmin /transfer", "net.webclient", "Start-BitsTransfer")
| extend EncodedCmd = ProcessCommandLine has_any ("-EncodedCommand", "-enc ", "-e ", "-ec ")
| extend ReconActivity = ProcessCommandLine has_any ("whoami", "net user", "net group", "nltest", "ipconfig", "systeminfo", "netstat", "tasklist", "net localgroup")
| extend HiddenExec = ProcessCommandLine has_any ("-WindowStyle Hidden", "-w hidden", "-nop ", "-noni ")
| where CredentialAccess or LateralMovement or PersistenceAttempt or DownloadAttempt or EncodedCmd or (ReconActivity and HiddenExec)
| project Timestamp, DeviceName, AccountName,
FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine,
InitiatingProcessParentFileName,
CredentialAccess, LateralMovement, PersistenceAttempt,
DownloadAttempt, EncodedCmd, ReconActivity, HiddenExec
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- SCCM/ConfigMgr routinely spawns PowerShell and cmd.exe to execute legitimate software deployment scripts, patch management, and compliance remediation — build an allowlist of authorized script names and package GUIDs from InitiatingProcessCommandLine
- BigFix (HCL) and PDQ Deploy are frequently used for IT administration tasks including software installs, configuration changes, and script execution that legitimately trigger this detection during patch cycles
- Intune Management Extension (IntuneManagementExtension.exe) executes PowerShell scripts deployed by administrators for device configuration, security baseline enforcement, and application installation
- AWS Systems Manager Run Command legitimately executes shell commands on EC2 instances for patch management, inventory collection, and operational runbooks — tune by allowlisting known SSM document names
- Automated patch management tools may use certutil or bitsadmin for downloading and verifying update packages from vendor CDNs
- Monitoring and inventory agents (SCCM hardware inventory, BigFix relevance queries) run net.exe and systeminfo.exe on a schedule to collect asset data
References (10)
- https://attack.mitre.org/techniques/T1072/
- https://www.mandiant.com/resources/blog/apt32-targeting-private-sector
- https://www.microsoft.com/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/
- https://www.mitiga.io/blog/mitiga-security-advisory-abusing-the-ssm-agent-as-a-remote-access-trojan
- https://posts.specterops.io/death-from-above-lateral-movement-from-azure-to-on-prem-ad-d18cb3959d4d
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a
- https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
- https://learn.microsoft.com/en-us/mem/configmgr/core/servers/manage/cmtrace
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1072/T1072.md
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
Unlock Pro Content
Get the full detection package for T1072 including response playbook, investigation guide, and atomic red team tests.