
Summary
This detection rule identifies the execution of the Windows command-line utility 'netsh' when it is invoked with the 'trace' flag to begin a network capture. This method can be used by attackers for reconnaissance or to gather information about network traffic, which can lead to credential access or further intrusion into the system. The rule looks for two specific indicators: the execution of the netsh executable and the presence of command line parameters that contain both the keywords 'trace' and 'start'. Monitoring such activity is crucial as attackers may try to hide their tracks by using built-in tools like netsh for malicious purposes. As a note, legitimate administrative use of this command may lead to false positives, so that should be taken into account when analyzing alerts triggered by this rule.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2019-10-24