
Summary
This detection rule identifies a potential persistence mechanism using the Windows netsh utility. Specifically, it is designed to monitor for the execution of netsh.exe with the "add helper" argument, which allows the addition of a custom helper DLL. This technique may be exploited by attackers to introduce a malicious DLL that can maintain persistence on the infected system, as the helper DLL will be invoked whenever netsh.exe runs. The presence of such behavior is a strong indicator of malicious intent and possibly a way for the attacker to retain access to the compromised system.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1546.007
Created: 2019-10-25