Lateral Movement Investigation Runbook

SOC & DFIR Operations Guide

Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access


Overview & Scope

This runbook provides standardised procedures for investigating lateral movement attacks across the hybrid enterprise environment. Lateral movement is a critical phase in the attack lifecycle where adversaries move through a network in search of key assets and data. Detecting and disrupting lateral movement is essential to preventing major breaches.

Lateral Movement Definition

Lateral movement refers to techniques adversaries use to enter and control remote systems on a network after gaining initial access.

The primary goals are:

  • Access additional systems to find valuable targets

  • Maintain persistence across multiple systems

  • Escalate privileges by compromising higher-value accounts

  • Position for data exfiltration or objective execution

  • Evade detection by blending with normal network traffic

Lateral Movement Categories

By Authentication Method

Category
Description
Risk Level

Credential-Based

Using stolen credentials to authenticate

High

Token-Based

Reusing authentication tokens/tickets

High

Session-Based

Hijacking existing sessions

High

Key-Based

Using stolen SSH keys or certificates

High

Trust-Based

Exploiting trust relationships

Critical

By Protocol/Technique

Technique
Protocol/Method
Common Tools

Remote Desktop

RDP (3389)

mstsc, SharpRDP

Windows Admin Shares

SMB (445)

PsExec, net use

Windows Remote Management

WinRM (5985/5986)

PowerShell Remoting, Evil-WinRM

WMI Execution

DCOM/WMI (135+)

wmic, Invoke-WmiMethod

SSH

SSH (22)

OpenSSH, PuTTY

Remote Services

Various

RPC, DCOM, MMC

Pass-the-Hash

NTLM

Mimikatz, Impacket

Pass-the-Ticket

Kerberos

Mimikatz, Rubeus

Overpass-the-Hash

Kerberos

Mimikatz, Rubeus

Pass-the-Certificate

Kerberos PKINIT

Certify, Rubeus

Distributed Component Object Model

DCOM

Various

Remote Registry

SMB

reg.exe

Scheduled Tasks

RPC/SMB

schtasks, at

Service Execution

RPC/SMB

sc.exe, PsExec

Common Lateral Movement Attack Chains

Chain 1: Credential Theft → Pass-the-Hash → SMB Lateral Movement

Chain 2: Kerberoasting → Service Account Compromise → Lateral Movement

Chain 3: RDP Hijacking → Session Takeover

Chain 4: WinRM PowerShell Remoting


Detection Sources & Data Mapping

Log Sources Matrix

Platform
Log Table
Lateral Movement Data

Defender for Endpoint

DeviceLogonEvents

All logon types, source/dest IPs

Defender for Endpoint

DeviceNetworkEvents

SMB, RDP, WinRM connections

Defender for Endpoint

DeviceProcessEvents

PsExec, WMIC, remote execution

Defender for Endpoint

DeviceEvents

Named pipes, remote service creation

Defender for Identity

IdentityLogonEvents

Authentication anomalies

Defender for Identity

IdentityDirectoryEvents

Pass-the-Hash, Pass-the-Ticket

On-Prem AD

SecurityEvent

4624, 4648, 4768, 4769, 4776

Sentinel

Syslog

Linux SSH, authentication

Prisma Access

PaloAltoPrismaAccess

East-west traffic, segmentation violations

Azure/Entra

SigninLogs

Cloud resource access

Critical Windows Event IDs

Network Logon Events

Event ID
Description
Lateral Movement Relevance

4624 (Type 3)

Network logon

Primary lateral movement indicator

4624 (Type 10)

Remote Interactive (RDP)

RDP-based lateral movement

4624 (Type 7)

Unlock

Session resume

4648

Explicit credential logon

RunAs, credential reuse

4625

Failed logon

Lateral movement attempts

4647

User initiated logoff

Session end tracking

Kerberos Events

Event ID
Description
Lateral Movement Relevance

4768

TGT requested

Initial authentication

4769

TGS requested

Service access, Kerberoasting

4770

TGT renewed

Extended session

4771

Kerberos pre-auth failed

Failed lateral movement

NTLM Events

Event ID
Description
Lateral Movement Relevance

4776

NTLM authentication

Pass-the-Hash detection

8004

NTLM authentication (DC)

NTLM relay, PTH

Process & Service Events

Event ID
Description
Lateral Movement Relevance

4688

Process creation

Remote command execution

4697

Service installed

PsExec, remote service

4698

Scheduled task created

Remote task execution

5140

Network share accessed

SMB lateral movement

5145

Share object access checked

Admin share access

Remote Access Events

Event ID
Description
Lateral Movement Relevance

1149

RDP authentication succeeded

RDP lateral movement

21

RDP session logon

RDP session start

24

RDP session disconnect

Session tracking

25

RDP session reconnect

Session hijacking

4778

Session reconnected

Session hijacking

4779

Session disconnected

Session tracking

Logon Type Reference

Logon Type
Name
Description
Lateral Movement Risk

2

Interactive

Local console logon

Low (requires physical)

3

Network

SMB, WinRM, remote access

High

4

Batch

Scheduled task execution

Medium

5

Service

Service account logon

Medium

7

Unlock

Workstation unlock

Low

8

NetworkCleartext

IIS Basic Auth

Medium

9

NewCredentials

RunAs /netonly

High

10

RemoteInteractive

RDP

High

11

CachedInteractive

Cached credentials

Medium


Investigation Workflows

General Lateral Movement Investigation

Objective: Identify, scope, and contain lateral movement activity across the environment.

Step 1: Initial Alert Triage

  1. Review alert source and detection logic

  2. Identify source and destination systems

  3. Determine account(s) involved

  4. Check timestamp and establish baseline timeline

  5. Assess if source system was already compromised

Step 2: Authentication Pattern Analysis

  1. Query all logon events for the account (7-30 days)

  2. Establish normal access patterns (systems, times, methods)

  3. Identify anomalous destination systems

  4. Check for unusual logon types

  5. Look for authentication method changes (Kerberos vs. NTLM)

Step 3: Source System Investigation

  1. Determine how attacker gained access to source

  2. Check for credential theft indicators

  3. Review process execution history

  4. Identify lateral movement tools/techniques used

  5. Check for persistence mechanisms

Step 4: Destination System Investigation

  1. Document all activity on destination system

  2. Check for secondary lateral movement (pivot)

  3. Review data access and exfiltration indicators

  4. Identify any persistence established

  5. Check for privilege escalation attempts

Step 5: Scope Determination

  1. Query for same account across all systems

  2. Search for same source IP across all authentications

  3. Look for similar techniques from other accounts

  4. Map all compromised systems

  5. Identify potential data exposure

Step 6: Timeline Construction

  1. Create chronological timeline of all events

  2. Map initial access → lateral movement chain

  3. Document each hop with timestamps

  4. Identify dwell time per system

  5. Correlate with known threat actor TTPs


RDP Lateral Movement Investigation

Objective: Investigate Remote Desktop-based lateral movement.

Detection Indicators

  • Logon Type 10 from unusual sources

  • RDP connections during non-business hours

  • RDP from servers to workstations (unusual direction)

  • RDP session hijacking (tscon.exe usage)

  • Multiple failed RDP attempts followed by success

  • RDP connections from recently compromised systems

Investigation Steps

  1. Identify RDP Sessions

    • Query DeviceLogonEvents for LogonType "RemoteInteractive"

    • Review Event ID 1149, 21, 24, 25 on target

    • Check TerminalServices-LocalSessionManager logs

  2. Analyse Source System

    • Verify source system is authorised for RDP

    • Check if source system shows compromise indicators

    • Review outbound RDP connections from source

    • Check for RDP-related tools (mstsc spawning from unusual parents)

  3. Session Hijacking Detection

    • Search for tscon.exe execution

    • Check for query session / quser commands

    • Look for session ID manipulation

    • Review SYSTEM-level RDP access

  4. Map RDP Chain

    • Track all RDP hops from initial system

    • Document credentials used at each hop

    • Identify final destination/objective

    • Check for data accessed via RDP sessions


SMB/Admin Share Lateral Movement Investigation

Objective: Investigate lateral movement via Windows Admin Shares and SMB.

Detection Indicators

  • Access to C$, ADMIN$, IPC$ shares from non-admin workstations

  • SMB connections to unusual systems

  • PsExec service installation (PSEXESVC)

  • High volume of SMB connections from single source

  • SMB authentication failures followed by success

  • Use of explicit credentials for SMB access

Investigation Steps

  1. Identify SMB Activity

    • Query Event ID 5140, 5145 for share access

    • Review DeviceNetworkEvents for port 445 connections

    • Check for admin share ($) access patterns

    • Identify source IPs and accounts

  2. PsExec/Remote Service Detection

    • Search for PSEXESVC service creation

    • Look for services with unusual names

    • Check for service binary paths to ADMIN$

    • Review service account usage

  3. File Transfer Analysis

    • Check for executable files copied to shares

    • Review files dropped in ADMIN$, C$

    • Look for staging directories

    • Identify malicious payloads transferred

  4. Credential Analysis

    • Determine if PTH was used (NTLM only)

    • Check for explicit credential usage (4648)

    • Review account privilege level

    • Identify source of compromised credentials


WinRM/PowerShell Remoting Investigation

Objective: Investigate lateral movement via Windows Remote Management.

Detection Indicators

  • WinRM connections (port 5985/5986) from unusual sources

  • PowerShell remoting from non-admin systems

  • Enter-PSSession / Invoke-Command usage

  • WinRM service enabled on unusual systems

  • Encoded PowerShell commands in remote sessions

  • Evil-WinRM or similar tool signatures

Investigation Steps

  1. Identify WinRM Sessions

    • Query DeviceNetworkEvents for ports 5985/5986

    • Review Windows Remote Management operational logs

    • Check for WSMan connections

    • Identify source and destination pairs

  2. PowerShell Analysis

    • Review PowerShell script block logging

    • Check for encoded commands in remote sessions

    • Analyse Invoke-Command patterns

    • Look for New-PSSession creations

  3. Credential Usage

    • Check if CredSSP was used (credential delegation)

    • Review explicit credential specifications

    • Look for Enter-PSSession with -Credential

    • Check for PSCredential object creation

  4. Command Execution

    • Review commands executed via remoting

    • Check for reconnaissance commands

    • Look for credential access commands

    • Identify persistence establishment


WMI Lateral Movement Investigation

Objective: Investigate lateral movement via Windows Management Instrumentation.

Detection Indicators

  • WMIC process creation events

  • WMI remote connections (DCOM)

  • WmiPrvSE.exe spawning unusual processes

  • Process creation via Win32_Process

  • WMI subscriptions created remotely

  • Event ID 5857, 5858, 5859, 5861 (WMI Activity)

Investigation Steps

  1. Identify WMI Activity

    • Query for WMIC.exe process execution

    • Review WmiPrvSE.exe child processes

    • Check WMI-Activity operational logs

    • Look for Win32_Process Create method calls

  2. Remote WMI Detection

    • Check for /node: parameter in WMIC

    • Review DCOM connections (port 135+)

    • Look for WMI authentication events

    • Identify source systems for remote WMI

  3. Command Execution Analysis

    • Review process command lines

    • Check for encoded commands

    • Look for script downloads/execution

    • Identify persistence attempts


Pass-the-Hash/Ticket Investigation

Objective: Investigate credential reuse attacks for lateral movement.

Pass-the-Hash Indicators

  • NTLM authentication where Kerberos expected

  • Network logons without corresponding interactive logon

  • Event 4776 success without 4624 Type 2

  • NTLM from systems with Kerberos capability

  • Multiple hosts accessed with same NTLM hash

  • Impacket/Mimikatz tool indicators

Pass-the-Ticket Indicators

  • Kerberos tickets used from unexpected hosts

  • TGS without corresponding TGT request

  • Ticket encryption anomalies

  • Forwardable tickets from non-domain systems

  • Service access without prior TGT

Investigation Steps

  1. Identify Authentication Anomalies

    • Correlate NTLM vs Kerberos usage

    • Check for missing authentication chain events

    • Review MDI alerts for PTH/PTT

    • Analyse authentication source vs. account home

  2. Timeline Reconstruction

    • Map all authentications for affected account

    • Identify patient zero for credential theft

    • Track all systems accessed post-compromise

    • Correlate with credential dumping activity

  3. Ticket Analysis (PTT)

    • Review Kerberos ticket properties

    • Check for anomalous encryption types

    • Look for ticket lifetime anomalies

    • Identify service tickets without TGT


KQL Query Cheat Sheet

Network Logon Analysis

All Network Logons (Type 3)

Unusual Network Logon Sources

Lateral Movement Velocity Detection


RDP Lateral Movement

RDP Connections Analysis

RDP from Server to Workstation (Unusual Direction)

RDP Session Hijacking Detection

RDP Brute Force Followed by Success


SMB/Admin Share Activity

Admin Share Access Detection

PsExec Service Detection

SMB Lateral Movement Pattern

File Copy to Admin Shares


WinRM/PowerShell Remoting

WinRM Connections

PowerShell Remoting Commands

Remote PowerShell Session Creation


WMI Lateral Movement

Remote WMI Execution

WMI Process Creation

DCOM Lateral Movement


Pass-the-Hash / Pass-the-Ticket

NTLM Authentication Anomalies

Pass-the-Hash Detection (MDI)

Kerberos Ticket Anomalies


Scheduled Task & Service Lateral Movement

Remote Scheduled Task Creation

Remote Service Creation


Cross-Platform Queries

Unified Lateral Movement Detection

Lateral Movement Chain Reconstruction


Prisma Access Network Detection

East-West Traffic Anomalies

Unusual Internal RDP Traffic


Response Actions & Remediation

Immediate Containment Actions

Scenario
Action
Method

Active Lateral Movement

Isolate source and destination systems

MDE Device Isolation

Compromised Account

Disable account, revoke sessions

AD + Entra ID

Credential Theft Confirmed

Reset all potentially compromised credentials

AD + Entra ID

RDP-based Movement

Block RDP at network level

Prisma Access / Firewall

SMB-based Movement

Block SMB between segments

Prisma Access / Firewall

PTH/PTT Detected

Reset affected account passwords

AD

Multiple Systems Compromised

Network segment isolation

Firewall / VLAN changes

Containment Commands

MDE Device Isolation

Block Lateral Movement at Network Level

Disable Compromised Account

Post-Incident Remediation

For Each Compromised System

  1. Evidence Collection

    • Memory dump if possible

    • Event logs export

    • File system timeline

    • Network connection logs

  2. Malware/Tool Removal

    • Remove attacker tools

    • Delete persistence mechanisms

    • Clear credential caches

    • Remove unauthorised accounts

  3. Credential Reset

    • Reset local admin passwords

    • Reset cached domain credentials

    • Consider LAPS redeployment

  4. System Hardening

    • Apply missing patches

    • Enable advanced audit logging

    • Implement host firewall rules

    • Deploy/verify EDR agent

Network-Level Hardening

Action
Description
Implementation

Segment Networks

Limit lateral movement paths

VLAN / Firewall rules

Restrict Admin Shares

Disable C$, ADMIN$ where not needed

GPO / Registry

Limit RDP Access

Restrict RDP to jump servers

Firewall / NLA

Disable WinRM

Disable where not required

GPO

Implement LAPS

Randomize local admin passwords

LAPS deployment

Deploy PAWs

Privileged Access Workstations

Tiered admin model

Block NTLM

Enforce Kerberos authentication

GPO / Network policies


Quick Reference Cards

Lateral Movement Tool Signatures

Tool
Process Indicators
Network Indicators

PsExec

PSEXESVC service, psexec.exe

SMB (445) to ADMIN$

Impacket

Random service names, atexec.py

SMB (445), WMI (135)

CrackMapExec

Multiple SMB connections

SMB (445) spray pattern

Evil-WinRM

winrm connections, ruby signatures

WinRM (5985/5986)

Mimikatz

sekurlsa, lsadump commands

PTH/PTT artifacts

Cobalt Strike

Named pipes, beacons

HTTP/HTTPS beaconing

WMIExec

wmiprvse.exe children

DCOM (135+)

SharpRDP

mstsc activity, unusual parents

RDP (3389)

Rubeus

Kerberos ticket manipulation

4768, 4769 anomalies

Lateral Movement Detection Checklist

Check
Data Source
Query Focus

Network logons to multiple systems

DeviceLogonEvents

Type 3, unique targets

RDP connections from servers

DeviceLogonEvents

Type 10, server sources

Admin share access

DeviceNetworkEvents

Port 445, C$, ADMIN$

Service installation

DeviceEvents

ServiceInstalled

Scheduled task creation

DeviceEvents

ScheduledTaskCreated

WinRM connections

DeviceNetworkEvents

Port 5985/5986

WMI remote execution

DeviceProcessEvents

wmic /node

NTLM without Kerberos

IdentityLogonEvents

Protocol analysis

Pass-the-Hash

MDI alerts

PTH detection

Pass-the-Ticket

MDI alerts

PTT detection

Common Lateral Movement Ports

Port
Protocol
Usage
Risk

22

SSH

Linux remote access

High

135

RPC/DCOM

WMI, DCOM

High

139

NetBIOS

Legacy file sharing

Medium

445

SMB

File sharing, PsExec

Critical

3389

RDP

Remote Desktop

High

5985

WinRM HTTP

PowerShell Remoting

High

5986

WinRM HTTPS

Secure PS Remoting

High

49152-65535

Dynamic RPC

DCOM, WMI callbacks

High


Escalation Matrix

Severity Classification

Severity
Criteria
Response Time

🔴 Critical

Domain controller accessed, mass lateral movement (>10 systems), privileged account compromise

Immediate - 15 min

🟠 High

Multiple systems compromised (3-10), active C2 with lateral movement, data server access

30 min - 1 hour

🟡 Medium

Single system pivot, limited lateral movement, contained to workstation tier

4 hours

🟢 Low

Failed lateral movement attempts, reconnaissance only

Next business day

Escalation Triggers

Condition
Escalation Level

Domain Controller lateral movement

DFIR + Identity Team + CISO

>5 systems confirmed compromised

DFIR Team + SOC Manager

Pass-the-Hash/Ticket confirmed

Tier 2 SOC + Identity Team

Database/file server accessed

Tier 2 SOC + Data Owner

Active command and control

DFIR + Network Team

Lateral movement chain >3 hops

Tier 2 SOC

Unknown tools/techniques

DFIR for analysis

Communication Flow


MITRE ATT&CK Mapping

Lateral Movement (TA0008)

Technique
ID
Description
Detection

Remote Services: RDP

T1021.001

Remote Desktop Protocol

DeviceLogonEvents (Type 10)

Remote Services: SMB/Admin Shares

T1021.002

Windows Admin Shares

Event 5140, 5145

Remote Services: DCOM

T1021.003

Distributed COM

DeviceNetworkEvents (135)

Remote Services: SSH

T1021.004

Secure Shell

Syslog, network logs

Remote Services: WinRM

T1021.006

Windows Remote Management

DeviceNetworkEvents (5985/5986)

Remote Service Session Hijacking: RDP

T1563.002

RDP Session Hijacking

tscon.exe, Event 4778

Use Alternate Authentication Material: PTH

T1550.002

Pass the Hash

Event 4776, MDI

Use Alternate Authentication Material: PTT

T1550.003

Pass the Ticket

Event 4768/4769, MDI

Exploitation of Remote Services

T1210

Exploit vulnerabilities

MDE alerts

Internal Spearphishing

T1534

Phish internal users

EmailEvents

Lateral Tool Transfer

T1570

Copy tools between systems

DeviceFileEvents

Software Deployment Tools

T1072

Abuse deployment tools

Varies by tool

Taint Shared Content

T1080

Modify shared resources

DeviceFileEvents

Tactic
Technique
ID
Relevance

Discovery

Network Share Discovery

T1135

Pre-lateral movement recon

Discovery

Remote System Discovery

T1018

Target identification

Credential Access

OS Credential Dumping

T1003

Enables credential-based movement

Execution

Windows Management Instrumentation

T1047

WMI lateral execution

Execution

Scheduled Task/Job

T1053

Remote task execution

Execution

Service Execution

T1569

PsExec-style execution


Appendix: Investigation Commands

Network Connection Analysis

Authentication Event Analysis

Service & Task Analysis

Remote Execution Detection

Lateral Movement Tool Detection

Evidence Collection Script


⚠️ Critical Investigation Note: Lateral movement rarely occurs in isolation.

Always investigate: (1) How did the attacker gain initial access? (2) What credential theft occurred before movement? (3) What is the attacker's objective? (4) Has data exfiltration occurred?

Treat any confirmed lateral movement as a potential full environment compromise until proven otherwise.

Last updated