heroui logo

Windows Mail Protocol In Non-Common Process Path

Splunk Security Content

View Source
Summary
The detection rule titled 'Windows Mail Protocol In Non-Common Process Path' identifies Windows applications that establish SMTP connections from installation paths that are not typically associated with common email clients like Thunderbird or Outlook. Utilizing Sysmon EventCode 3, the rule analyzes processes making such connections, as adversaries, including malware variants like AgentTesla, often employ these SMTP communications for Command and Control (C2) purposes, leading to potential data exfiltration of sensitive information. The rule enhances threat detection by leveraging specific port criteria associated with SMTP traffic (port 25 or 587) and monitoring process execution paths that deviate from expected norms.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1071.003
  • T1071
Created: 2024-11-13