
Summary
The rule 'WPAD Service Exploit' identifies potential exploitation attempts against the Web Proxy Auto-Discovery Protocol (WPAD), a service that enables devices on a network to locate a proxy server automatically. Attackers with local network or upstream DNS access can inject malicious scripts into WPAD, leading to system compromises. This detection rule utilizes EQL (Event Query Language) to monitor the behavior of the 'svchost.exe' process, DNS queries associated with 'wpad', and the loading of 'jscript.dll'. The rule operates by establishing a sequence of events, including process starts, DNS requests for 'wpad', and any outgoing network traffic over port 80. The aim is to detect suspicious activity that may indicate privilege escalation through malicious script injection. Furthermore, a comprehensive investigation guide is provided to analyze alerts, considering legitimate scenarios that may trigger false positives, and detailing response steps to remediate any identified threats effectively. The rule is recognized as having a high severity, given its implications for system security and potential risks of privilege escalation from such exploits.
Categories
- Endpoint
- Network
Data Sources
- Process
- Network Traffic
- File
- Application Log
- User Account
ATT&CK Techniques
- T1068
Created: 2020-09-02