
Summary
The 'Unusual Process Network Connection' rule is designed to detect network connections initiated by unexpected system applications on Windows endpoints. This behavior is often indicative of potential adversarial actions, as these applications can be exploited by attackers to execute malicious code and evade security measures. The rule leverages EQL (Event Query Language) to track process executions and their corresponding network activity, specifically focusing on a predefined set of processes known for their common misuse in exploits. The rule analyzes process execution chains, identifying when these processes conduct network operations, and suggests in-depth investigation steps if anomalies are detected. The comprehensive response guidelines encourage incident response actions, including isolation of affected systems and credential exposure assessments, aiming to reduce the risk posed by such network activities. This rule assists security analysts in proactively identifying and responding to evasion tactics employed by threat actors within their environment, thereby enhancing overall endpoint security.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Network Traffic
ATT&CK Techniques
- T1127
Created: 2020-02-18