
Summary
The 'Ping Sleep Batch Command' rule is designed to detect the execution of ping commands with sleep functionality, typically used for delaying malicious activities. This tactic may be employed by attackers to evade security mechanisms, such as detection systems or sandbox environments, thereby prolonging unauthorized access to targeted systems and enabling data exfiltration. The detection relies on data from Endpoint Detection and Response (EDR) agents, capturing relevant process and parent process command-line information. The rule evaluates the presence of specific command-line parameters associated with ping commands, effectively identifying potentially malicious behavior while acknowledging that legitimate administrative tasks may introduce false positives.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1497
- T1497.003
Created: 2024-12-10