heroui logo

Suspicious Network Connection to IP Lookup Service APIs

Sigma Rules

View Source
Summary
This rule detects suspicious external IP address lookups by non-browser processes on Windows systems, potentially indicative of post-compromise behavior. It focuses on communications with known IP lookup services (e.g., api.ipify.org, checkip.amazonaws.com, etc.). The rule is structured to filter out well-known web browsers (e.g., Chrome, Firefox, Edge), ensuring that the alerts generated are for processes that are likely to be malicious or suspicious. The detection mechanism relies on log data from the network connection category, specifically monitoring destination hostnames associated with IP lookup services. The rule aims to identify unusual patterns of network activity that could suggest an attempt to verify compromised systems or utilize external lookup services to gather information without user interaction.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Process
Created: 2023-04-24