
Summary
This detection rule identifies suspicious processes making DNS queries to known abusive online services that are often used for text pasting, VoIP, instant messaging, and digital distribution. It utilizes Sysmon's Event ID 22 to monitor DNS query activities initiated from common process names such as cmd.exe or powershell.exe. Detection of such queries is crucial because they may signify attempts to download malicious content, a prevalent tactic for initial access in cyber attacks. If the activity is confirmed to be malicious, it could result in unauthorized execution of code, data exfiltration, or the compromise of targeted systems. To implement this rule efficiently, organizations should ensure it is executed daily, reviewing logs of the previous two weeks to capture any suspicious behavior.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1059.005
- T1059
Created: 2024-12-10