Skip to main content
Medium difficultyLateral Movement & Discovery30-45 minutes
SIEMXDRFirewall

Lateral Movement Investigation

When alerts indicate unusual internal connections, RDP to servers from workstations, PsExec executions, or SMB access to file shares from unexpected hosts, investigate by mapping the movement path, identifying the initial compromise point, checking for credential harvesting, and assessing the scope of accessed systems. Lateral movement is almost always part of a larger attack chain and warrants immediate escalation.

Overview

Lateral movement is one of the most critical attack phases to detect because it indicates an attacker has already gained initial access and is expanding their foothold. Adversaries move laterally using legitimate tools and protocols (RDP, SMB, WMI, PsExec, PowerShell remoting) making detection challenging because the same tools are used by administrators daily.

This playbook teaches you to distinguish malicious lateral movement from legitimate administrative activity by analyzing the source account, timing, destination pattern, and process context. Effective lateral movement investigation requires correlating data across SIEM, XDR, and network monitoring tools to reconstruct the full attack path.

When You See This

  1. 1

    XDR alert for PsExec, WMI, or PowerShell remoting execution from a non-admin workstation

  2. 2

    SIEM alert for RDP connections from a user account to servers they have never accessed before

  3. 3

    Firewall logs showing internal SMB traffic between hosts that do not normally communicate

  4. 4

    Unusual service installation or scheduled task creation on multiple hosts within a short window

Investigation Steps

  1. 1

    Map the connection chain

    Identify the source host, destination host(s), account used, protocol/tool, and timestamp for each lateral movement event. Build a timeline showing the progression from the initial host to each subsequent system. Look for patterns; attackers typically move from less-privileged to more-privileged systems.

    SIEMXDR
    index=endpoint (EventCode=4624 OR EventCode=4648) Logon_Type IN (3, 10) | stats values(dest_host) as targets, count by src_ip, user, Logon_Type | where count > 2
    index=endpoint process_name IN ("psexec.exe", "psexec64.exe", "wmic.exe") OR (process_name="powershell.exe" AND command_line="*-ComputerName*") | table _time, src_host, dest_host, user, process_name, command_line
  2. 2

    Identify the initial compromise point

    Trace back from the first lateral movement event to find how the attacker gained access to the source host. Check for prior phishing email delivery, exploit attempts, or compromised VPN credentials. The initial access point determines the full scope of the incident.

    SIEMXDR
    index=auth OR index=endpoint dest_host="first_compromised_host" | stats count by action, src_ip, user | sort -_time | head 100
  3. 3

    Check for credential harvesting

    Attackers typically harvest credentials before moving laterally. Look for LSASS memory access, Mimikatz patterns, SAM database access, or Kerberoasting activity on the compromised hosts. If credentials were harvested, all accounts on those systems should be considered compromised.

    XDR
    index=endpoint (process_name="lsass.exe" AND access_mask="0x1010") OR (process_name="mimikatz.exe") OR (EventCode=4769 Ticket_Encryption_Type=0x17) | table _time, dest_host, process_name, user

    Decision Point

    If: Credential harvesting detected on compromised hosts

    Yes → All accounts that were logged into those systems are potentially compromised. Expand scope to include password resets for all affected accounts.

    No → Attacker may be using initial compromised credentials only. Continue mapping the attack path.

  4. 4

    Assess scope and contain

    Determine all systems the attacker accessed and what data they could have reached. Isolate compromised endpoints from the network. Block the attacker account(s). Coordinate with system owners to assess data exposure.

    XDRFirewall
  5. 5

    Escalate to incident response

    Lateral movement always indicates an active intrusion beyond initial access. Document the full attack chain: initial access vector → compromised accounts → lateral movement path → accessed systems. Hand off to the incident response team with this timeline and all associated IOCs.

    SIEM

Common Mistakes

  1. 1

    Investigating only the destination alert without tracing back to the initial compromise point

  2. 2

    Dismissing RDP connections as "admin activity" without verifying the source account and timing

  3. 3

    Failing to check for credential harvesting tools, which means potentially compromised accounts go undetected

  4. 4

    Containing only the latest compromised system instead of all systems in the attack chain

Escalation Criteria

  • Any confirmed lateral movement; this always indicates an active intrusion

  • Credential harvesting tools detected (Mimikatz, SAM dump, LSASS access)

  • Movement toward domain controllers, databases, or other critical infrastructure

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including lateral movement investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

How do I distinguish malicious lateral movement from normal admin activity?
Check three things: (1) Is the source account an admin who normally accesses this system? (2) Is the timing consistent with normal work hours and maintenance windows? (3) Is the tool/protocol consistent with how admins normally manage this system? If any answer is "no," investigate further.
Should I always escalate lateral movement alerts?
Yes. Confirmed lateral movement means an attacker has already breached your perimeter and is expanding access. Even if the movement seems limited, the attacker may have additional access you have not discovered yet. Always escalate to ensure proper incident response.
How do I practice lateral movement investigations?
SOCSimulator scenarios include multi-stage attacks with lateral movement phases. Practice correlating SIEM, XDR, and firewall alerts to reconstruct attack paths, the skill that separates Tier 1 from Tier 2 analysts. Start free forever.
Technique

Remote Services (T1021) — Detection Training

Adversaries may use valid accounts to log into a service specifically designed to accept remote connections, such as tel…

Read more
Technique

Lateral Tool Transfer (T1570) — Detection Training

Adversaries may transfer tools or other files between systems in a compromised environment. Once brought into the victim…

Read more
Technique

OS Credential Dumping (T1003) — Detection Training

Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a h…

Read more
Technique

Command and Scripting Interpreter (T1059) — Detection Training

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and la…

Read more
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is XDR? — SOC Glossary

Extended Detection and Response (XDR) is a security platform that unifies telemetry from endpoints, networks, cloud work…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more

We use cookies to improve your experience and measure usage. Learn more