T1021.002 - SMB/Windows Admin Shares
Sub-technique
Tattiche:
Lateral Movement
Lateral Movement
Piattaforme:
Windows
Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.
SMB is a file, printer, and serial port sharing protocol for Windows machines on the same network or domain. Adversaries may use SMB to interact with file shares, allowing them to move laterally throughout a network. Linux and macOS implementations of SMB typically use Samba.
Windows systems have hidden network shares that are accessible only to administrators and provide the ability for remote file copy and other administrative functions. Example network shares include `C$`, `ADMIN$`, and `IPC$`. Adversaries may use this technique in conjunction with administrator-level [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely access a networked system over SMB,(Citation: Wikipedia Server Message Block) to interact with systems using remote procedure calls (RPCs),(Citation: TechNet RPC) transfer files, and run transferred binaries through remote Execution. Example execution techniques that rely on authenticated sessions over SMB/RPC are [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Service Execution](https://attack.mitre.org/techniques/T1569/002), and [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). Adversaries can also use NTLM hashes to access administrator shares on systems with [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) and certain configuration and patch levels.(Citation: Microsoft Admin Shares)
SMB is a file, printer, and serial port sharing protocol for Windows machines on the same network or domain. Adversaries may use SMB to interact with file shares, allowing them to move laterally throughout a network. Linux and macOS implementations of SMB typically use Samba.
Windows systems have hidden network shares that are accessible only to administrators and provide the ability for remote file copy and other administrative functions. Example network shares include `C$`, `ADMIN$`, and `IPC$`. Adversaries may use this technique in conjunction with administrator-level [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely access a networked system over SMB,(Citation: Wikipedia Server Message Block) to interact with systems using remote procedure calls (RPCs),(Citation: TechNet RPC) transfer files, and run transferred binaries through remote Execution. Example execution techniques that rely on authenticated sessions over SMB/RPC are [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Service Execution](https://attack.mitre.org/techniques/T1569/002), and [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). Adversaries can also use NTLM hashes to access administrator shares on systems with [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) and certain configuration and patch levels.(Citation: Microsoft Admin Shares)
Usato da Attori (20)
APT3
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Turla
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
APT32
Nation-state
Nation-state
FIN8
Unknown
Unknown
Orangeworm
Unknown
Unknown
WIZARD SPIDER
Nation-state
Nation-state
APT39
Unknown
Unknown
APT41
Nation-state
Nation-state
Fox Kitten
Unknown
Unknown
FIN13
Unknown
Unknown
ToddyCat
Unknown
Unknown
Velvet Ant
Unknown
Unknown
Aquatic Panda
Unknown
Unknown
Play
Unknown
Unknown
Sandworm Team
Unknown
Unknown
Cinnamon Tempest
Unknown
Unknown
Ke3chang
Unknown
Unknown
Storm-1811
Unknown
Unknown
Malware (20)
Stuxnet other
reGeorg other
RansomHub other
Emotet other
Olympic Destroyer other
Regin other
Conti other
Diavol other
Lucifer other
BlackEnergy other
zwShell other
NotPetya other
Conficker other
Anchor other
Duqu other
LockBit 3.0 other
Royal other
Shamoon other
BlackByte Ransomware other
Ryuk other
Metadata
| MITRE ID: | T1021.002 |
| STIX ID: | attack-pattern--4f9ca633-15c5-... |
| Piattaforme: | Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |