heroui logo

Network Connection via Signed Binary

Elastic Detection Rules

View Source
Summary
This rule detects potential malicious activity by monitoring specific Windows binaries that are commonly exploited by adversaries to execute unauthorized network connections. The rule focuses on binaries such as `expand.exe`, `extrac32.exe`, `ieexec.exe`, and `makecab.exe`. When these processes are executed, they should not establish connections to external IPs outside designated safe ranges. The detection is performed using EQL, which sequences the execution of the specified processes followed by network activity, allowing for effective identification of potential evasive actions taken by threat actors. The rule assists in highlighting instances where trusted binaries are misused to bypass application allowlisting and evade detection mechanisms, thus triggering further investigation. Response strategies include comprehensive analysis of user actions, process control, and potential eradication measures to safeguard network integrity.
Categories
  • Endpoint
  • Windows
  • Network
Data Sources
  • Process
  • Network Traffic
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218
Created: 2020-02-18