Lateral Movement Investigation Runbook
SOC & DFIR Operations Guide
Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access
Overview & Scope
This runbook provides standardised procedures for investigating lateral movement attacks across the hybrid enterprise environment. Lateral movement is a critical phase in the attack lifecycle where adversaries move through a network in search of key assets and data. Detecting and disrupting lateral movement is essential to preventing major breaches.
Lateral Movement Definition
Lateral movement refers to techniques adversaries use to enter and control remote systems on a network after gaining initial access.
The primary goals are:
Access additional systems to find valuable targets
Maintain persistence across multiple systems
Escalate privileges by compromising higher-value accounts
Position for data exfiltration or objective execution
Evade detection by blending with normal network traffic
Lateral Movement Categories
By Authentication Method
Credential-Based
Using stolen credentials to authenticate
High
Token-Based
Reusing authentication tokens/tickets
High
Session-Based
Hijacking existing sessions
High
Key-Based
Using stolen SSH keys or certificates
High
Trust-Based
Exploiting trust relationships
Critical
By Protocol/Technique
Remote Desktop
RDP (3389)
mstsc, SharpRDP
Windows Admin Shares
SMB (445)
PsExec, net use
Windows Remote Management
WinRM (5985/5986)
PowerShell Remoting, Evil-WinRM
WMI Execution
DCOM/WMI (135+)
wmic, Invoke-WmiMethod
SSH
SSH (22)
OpenSSH, PuTTY
Remote Services
Various
RPC, DCOM, MMC
Pass-the-Hash
NTLM
Mimikatz, Impacket
Pass-the-Ticket
Kerberos
Mimikatz, Rubeus
Overpass-the-Hash
Kerberos
Mimikatz, Rubeus
Pass-the-Certificate
Kerberos PKINIT
Certify, Rubeus
Distributed Component Object Model
DCOM
Various
Remote Registry
SMB
reg.exe
Scheduled Tasks
RPC/SMB
schtasks, at
Service Execution
RPC/SMB
sc.exe, PsExec
Common Lateral Movement Attack Chains
Chain 1: Credential Theft → Pass-the-Hash → SMB Lateral Movement
Chain 2: Kerberoasting → Service Account Compromise → Lateral Movement
Chain 3: RDP Hijacking → Session Takeover
Chain 4: WinRM PowerShell Remoting
Detection Sources & Data Mapping
Log Sources Matrix
Defender for Endpoint
DeviceLogonEvents
All logon types, source/dest IPs
Defender for Endpoint
DeviceNetworkEvents
SMB, RDP, WinRM connections
Defender for Endpoint
DeviceProcessEvents
PsExec, WMIC, remote execution
Defender for Endpoint
DeviceEvents
Named pipes, remote service creation
Defender for Identity
IdentityLogonEvents
Authentication anomalies
Defender for Identity
IdentityDirectoryEvents
Pass-the-Hash, Pass-the-Ticket
On-Prem AD
SecurityEvent
4624, 4648, 4768, 4769, 4776
Sentinel
Syslog
Linux SSH, authentication
Prisma Access
PaloAltoPrismaAccess
East-west traffic, segmentation violations
Azure/Entra
SigninLogs
Cloud resource access
Critical Windows Event IDs
Network Logon Events
4624 (Type 3)
Network logon
Primary lateral movement indicator
4624 (Type 10)
Remote Interactive (RDP)
RDP-based lateral movement
4624 (Type 7)
Unlock
Session resume
4648
Explicit credential logon
RunAs, credential reuse
4625
Failed logon
Lateral movement attempts
4647
User initiated logoff
Session end tracking
Kerberos Events
4768
TGT requested
Initial authentication
4769
TGS requested
Service access, Kerberoasting
4770
TGT renewed
Extended session
4771
Kerberos pre-auth failed
Failed lateral movement
NTLM Events
4776
NTLM authentication
Pass-the-Hash detection
8004
NTLM authentication (DC)
NTLM relay, PTH
Process & Service Events
4688
Process creation
Remote command execution
4697
Service installed
PsExec, remote service
4698
Scheduled task created
Remote task execution
5140
Network share accessed
SMB lateral movement
5145
Share object access checked
Admin share access
Remote Access Events
1149
RDP authentication succeeded
RDP lateral movement
21
RDP session logon
RDP session start
24
RDP session disconnect
Session tracking
25
RDP session reconnect
Session hijacking
4778
Session reconnected
Session hijacking
4779
Session disconnected
Session tracking
Logon Type Reference
2
Interactive
Local console logon
Low (requires physical)
3
Network
SMB, WinRM, remote access
High
4
Batch
Scheduled task execution
Medium
5
Service
Service account logon
Medium
7
Unlock
Workstation unlock
Low
8
NetworkCleartext
IIS Basic Auth
Medium
9
NewCredentials
RunAs /netonly
High
10
RemoteInteractive
RDP
High
11
CachedInteractive
Cached credentials
Medium
Investigation Workflows
General Lateral Movement Investigation
Objective: Identify, scope, and contain lateral movement activity across the environment.
Step 1: Initial Alert Triage
Review alert source and detection logic
Identify source and destination systems
Determine account(s) involved
Check timestamp and establish baseline timeline
Assess if source system was already compromised
Step 2: Authentication Pattern Analysis
Query all logon events for the account (7-30 days)
Establish normal access patterns (systems, times, methods)
Identify anomalous destination systems
Check for unusual logon types
Look for authentication method changes (Kerberos vs. NTLM)
Step 3: Source System Investigation
Determine how attacker gained access to source
Check for credential theft indicators
Review process execution history
Identify lateral movement tools/techniques used
Check for persistence mechanisms
Step 4: Destination System Investigation
Document all activity on destination system
Check for secondary lateral movement (pivot)
Review data access and exfiltration indicators
Identify any persistence established
Check for privilege escalation attempts
Step 5: Scope Determination
Query for same account across all systems
Search for same source IP across all authentications
Look for similar techniques from other accounts
Map all compromised systems
Identify potential data exposure
Step 6: Timeline Construction
Create chronological timeline of all events
Map initial access → lateral movement chain
Document each hop with timestamps
Identify dwell time per system
Correlate with known threat actor TTPs
RDP Lateral Movement Investigation
Objective: Investigate Remote Desktop-based lateral movement.
Detection Indicators
Logon Type 10 from unusual sources
RDP connections during non-business hours
RDP from servers to workstations (unusual direction)
RDP session hijacking (tscon.exe usage)
Multiple failed RDP attempts followed by success
RDP connections from recently compromised systems
Investigation Steps
Identify RDP Sessions
Query DeviceLogonEvents for LogonType "RemoteInteractive"
Review Event ID 1149, 21, 24, 25 on target
Check TerminalServices-LocalSessionManager logs
Analyse Source System
Verify source system is authorised for RDP
Check if source system shows compromise indicators
Review outbound RDP connections from source
Check for RDP-related tools (mstsc spawning from unusual parents)
Session Hijacking Detection
Search for tscon.exe execution
Check for query session / quser commands
Look for session ID manipulation
Review SYSTEM-level RDP access
Map RDP Chain
Track all RDP hops from initial system
Document credentials used at each hop
Identify final destination/objective
Check for data accessed via RDP sessions
SMB/Admin Share Lateral Movement Investigation
Objective: Investigate lateral movement via Windows Admin Shares and SMB.
Detection Indicators
Access to C$, ADMIN$, IPC$ shares from non-admin workstations
SMB connections to unusual systems
PsExec service installation (PSEXESVC)
High volume of SMB connections from single source
SMB authentication failures followed by success
Use of explicit credentials for SMB access
Investigation Steps
Identify SMB Activity
Query Event ID 5140, 5145 for share access
Review DeviceNetworkEvents for port 445 connections
Check for admin share ($) access patterns
Identify source IPs and accounts
PsExec/Remote Service Detection
Search for PSEXESVC service creation
Look for services with unusual names
Check for service binary paths to ADMIN$
Review service account usage
File Transfer Analysis
Check for executable files copied to shares
Review files dropped in ADMIN$, C$
Look for staging directories
Identify malicious payloads transferred
Credential Analysis
Determine if PTH was used (NTLM only)
Check for explicit credential usage (4648)
Review account privilege level
Identify source of compromised credentials
WinRM/PowerShell Remoting Investigation
Objective: Investigate lateral movement via Windows Remote Management.
Detection Indicators
WinRM connections (port 5985/5986) from unusual sources
PowerShell remoting from non-admin systems
Enter-PSSession / Invoke-Command usage
WinRM service enabled on unusual systems
Encoded PowerShell commands in remote sessions
Evil-WinRM or similar tool signatures
Investigation Steps
Identify WinRM Sessions
Query DeviceNetworkEvents for ports 5985/5986
Review Windows Remote Management operational logs
Check for WSMan connections
Identify source and destination pairs
PowerShell Analysis
Review PowerShell script block logging
Check for encoded commands in remote sessions
Analyse Invoke-Command patterns
Look for New-PSSession creations
Credential Usage
Check if CredSSP was used (credential delegation)
Review explicit credential specifications
Look for Enter-PSSession with -Credential
Check for PSCredential object creation
Command Execution
Review commands executed via remoting
Check for reconnaissance commands
Look for credential access commands
Identify persistence establishment
WMI Lateral Movement Investigation
Objective: Investigate lateral movement via Windows Management Instrumentation.
Detection Indicators
WMIC process creation events
WMI remote connections (DCOM)
WmiPrvSE.exe spawning unusual processes
Process creation via Win32_Process
WMI subscriptions created remotely
Event ID 5857, 5858, 5859, 5861 (WMI Activity)
Investigation Steps
Identify WMI Activity
Query for WMIC.exe process execution
Review WmiPrvSE.exe child processes
Check WMI-Activity operational logs
Look for Win32_Process Create method calls
Remote WMI Detection
Check for /node: parameter in WMIC
Review DCOM connections (port 135+)
Look for WMI authentication events
Identify source systems for remote WMI
Command Execution Analysis
Review process command lines
Check for encoded commands
Look for script downloads/execution
Identify persistence attempts
Pass-the-Hash/Ticket Investigation
Objective: Investigate credential reuse attacks for lateral movement.
Pass-the-Hash Indicators
NTLM authentication where Kerberos expected
Network logons without corresponding interactive logon
Event 4776 success without 4624 Type 2
NTLM from systems with Kerberos capability
Multiple hosts accessed with same NTLM hash
Impacket/Mimikatz tool indicators
Pass-the-Ticket Indicators
Kerberos tickets used from unexpected hosts
TGS without corresponding TGT request
Ticket encryption anomalies
Forwardable tickets from non-domain systems
Service access without prior TGT
Investigation Steps
Identify Authentication Anomalies
Correlate NTLM vs Kerberos usage
Check for missing authentication chain events
Review MDI alerts for PTH/PTT
Analyse authentication source vs. account home
Timeline Reconstruction
Map all authentications for affected account
Identify patient zero for credential theft
Track all systems accessed post-compromise
Correlate with credential dumping activity
Ticket Analysis (PTT)
Review Kerberos ticket properties
Check for anomalous encryption types
Look for ticket lifetime anomalies
Identify service tickets without TGT
KQL Query Cheat Sheet
Network Logon Analysis
All Network Logons (Type 3)
Unusual Network Logon Sources
Lateral Movement Velocity Detection
RDP Lateral Movement
RDP Connections Analysis
RDP from Server to Workstation (Unusual Direction)
RDP Session Hijacking Detection
RDP Brute Force Followed by Success
SMB/Admin Share Activity
Admin Share Access Detection
PsExec Service Detection
SMB Lateral Movement Pattern
File Copy to Admin Shares
WinRM/PowerShell Remoting
WinRM Connections
PowerShell Remoting Commands
Remote PowerShell Session Creation
WMI Lateral Movement
Remote WMI Execution
WMI Process Creation
DCOM Lateral Movement
Pass-the-Hash / Pass-the-Ticket
NTLM Authentication Anomalies
Pass-the-Hash Detection (MDI)
Kerberos Ticket Anomalies
Scheduled Task & Service Lateral Movement
Remote Scheduled Task Creation
Remote Service Creation
Cross-Platform Queries
Unified Lateral Movement Detection
Lateral Movement Chain Reconstruction
Prisma Access Network Detection
East-West Traffic Anomalies
Unusual Internal RDP Traffic
Response Actions & Remediation
Immediate Containment Actions
Active Lateral Movement
Isolate source and destination systems
MDE Device Isolation
Compromised Account
Disable account, revoke sessions
AD + Entra ID
Credential Theft Confirmed
Reset all potentially compromised credentials
AD + Entra ID
RDP-based Movement
Block RDP at network level
Prisma Access / Firewall
SMB-based Movement
Block SMB between segments
Prisma Access / Firewall
PTH/PTT Detected
Reset affected account passwords
AD
Multiple Systems Compromised
Network segment isolation
Firewall / VLAN changes
Containment Commands
MDE Device Isolation
Block Lateral Movement at Network Level
Disable Compromised Account
Post-Incident Remediation
For Each Compromised System
Evidence Collection
Memory dump if possible
Event logs export
File system timeline
Network connection logs
Malware/Tool Removal
Remove attacker tools
Delete persistence mechanisms
Clear credential caches
Remove unauthorised accounts
Credential Reset
Reset local admin passwords
Reset cached domain credentials
Consider LAPS redeployment
System Hardening
Apply missing patches
Enable advanced audit logging
Implement host firewall rules
Deploy/verify EDR agent
Network-Level Hardening
Segment Networks
Limit lateral movement paths
VLAN / Firewall rules
Restrict Admin Shares
Disable C$, ADMIN$ where not needed
GPO / Registry
Limit RDP Access
Restrict RDP to jump servers
Firewall / NLA
Disable WinRM
Disable where not required
GPO
Implement LAPS
Randomize local admin passwords
LAPS deployment
Deploy PAWs
Privileged Access Workstations
Tiered admin model
Block NTLM
Enforce Kerberos authentication
GPO / Network policies
Quick Reference Cards
Lateral Movement Tool Signatures
PsExec
PSEXESVC service, psexec.exe
SMB (445) to ADMIN$
Impacket
Random service names, atexec.py
SMB (445), WMI (135)
CrackMapExec
Multiple SMB connections
SMB (445) spray pattern
Evil-WinRM
winrm connections, ruby signatures
WinRM (5985/5986)
Mimikatz
sekurlsa, lsadump commands
PTH/PTT artifacts
Cobalt Strike
Named pipes, beacons
HTTP/HTTPS beaconing
WMIExec
wmiprvse.exe children
DCOM (135+)
SharpRDP
mstsc activity, unusual parents
RDP (3389)
Rubeus
Kerberos ticket manipulation
4768, 4769 anomalies
Lateral Movement Detection Checklist
Network logons to multiple systems
DeviceLogonEvents
Type 3, unique targets
RDP connections from servers
DeviceLogonEvents
Type 10, server sources
Admin share access
DeviceNetworkEvents
Port 445, C$, ADMIN$
Service installation
DeviceEvents
ServiceInstalled
Scheduled task creation
DeviceEvents
ScheduledTaskCreated
WinRM connections
DeviceNetworkEvents
Port 5985/5986
WMI remote execution
DeviceProcessEvents
wmic /node
NTLM without Kerberos
IdentityLogonEvents
Protocol analysis
Pass-the-Hash
MDI alerts
PTH detection
Pass-the-Ticket
MDI alerts
PTT detection
Common Lateral Movement Ports
22
SSH
Linux remote access
High
135
RPC/DCOM
WMI, DCOM
High
139
NetBIOS
Legacy file sharing
Medium
445
SMB
File sharing, PsExec
Critical
3389
RDP
Remote Desktop
High
5985
WinRM HTTP
PowerShell Remoting
High
5986
WinRM HTTPS
Secure PS Remoting
High
49152-65535
Dynamic RPC
DCOM, WMI callbacks
High
Escalation Matrix
Severity Classification
🔴 Critical
Domain controller accessed, mass lateral movement (>10 systems), privileged account compromise
Immediate - 15 min
🟠 High
Multiple systems compromised (3-10), active C2 with lateral movement, data server access
30 min - 1 hour
🟡 Medium
Single system pivot, limited lateral movement, contained to workstation tier
4 hours
🟢 Low
Failed lateral movement attempts, reconnaissance only
Next business day
Escalation Triggers
Domain Controller lateral movement
DFIR + Identity Team + CISO
>5 systems confirmed compromised
DFIR Team + SOC Manager
Pass-the-Hash/Ticket confirmed
Tier 2 SOC + Identity Team
Database/file server accessed
Tier 2 SOC + Data Owner
Active command and control
DFIR + Network Team
Lateral movement chain >3 hops
Tier 2 SOC
Unknown tools/techniques
DFIR for analysis
Communication Flow
MITRE ATT&CK Mapping
Lateral Movement (TA0008)
Remote Services: RDP
T1021.001
Remote Desktop Protocol
DeviceLogonEvents (Type 10)
Remote Services: SMB/Admin Shares
T1021.002
Windows Admin Shares
Event 5140, 5145
Remote Services: DCOM
T1021.003
Distributed COM
DeviceNetworkEvents (135)
Remote Services: SSH
T1021.004
Secure Shell
Syslog, network logs
Remote Services: WinRM
T1021.006
Windows Remote Management
DeviceNetworkEvents (5985/5986)
Remote Service Session Hijacking: RDP
T1563.002
RDP Session Hijacking
tscon.exe, Event 4778
Use Alternate Authentication Material: PTH
T1550.002
Pass the Hash
Event 4776, MDI
Use Alternate Authentication Material: PTT
T1550.003
Pass the Ticket
Event 4768/4769, MDI
Exploitation of Remote Services
T1210
Exploit vulnerabilities
MDE alerts
Internal Spearphishing
T1534
Phish internal users
EmailEvents
Lateral Tool Transfer
T1570
Copy tools between systems
DeviceFileEvents
Software Deployment Tools
T1072
Abuse deployment tools
Varies by tool
Taint Shared Content
T1080
Modify shared resources
DeviceFileEvents
Related Techniques
Discovery
Network Share Discovery
T1135
Pre-lateral movement recon
Discovery
Remote System Discovery
T1018
Target identification
Credential Access
OS Credential Dumping
T1003
Enables credential-based movement
Execution
Windows Management Instrumentation
T1047
WMI lateral execution
Execution
Scheduled Task/Job
T1053
Remote task execution
Execution
Service Execution
T1569
PsExec-style execution
Appendix: Investigation Commands
Network Connection Analysis
Authentication Event Analysis
Service & Task Analysis
Remote Execution Detection
Lateral Movement Tool Detection
Evidence Collection Script
⚠️ Critical Investigation Note: Lateral movement rarely occurs in isolation.
Always investigate: (1) How did the attacker gain initial access? (2) What credential theft occurred before movement? (3) What is the attacker's objective? (4) Has data exfiltration occurred?
Treat any confirmed lateral movement as a potential full environment compromise until proven otherwise.
Last updated