heroui logo

Windows SOAPHound Binary Execution

Splunk Security Content

View Source
Summary
The 'Windows SOAPHound Binary Execution' analytic rule detects the execution of the SOAPHound binary (`soaphound.exe`) with specific command-line arguments. It utilizes data from EDR agents like Sysmon and Windows Event Logging. SOAPHound serves as a credential dumping tool used in malicious operations; detecting its execution is critical in identifying potential threats in an environment. The search query specifically filters for occurrences of `soaphound.exe` or its original file name along with a set of indicative command-line arguments associated with known functionalities of SOAPHound. This detection facilitates early warning to security teams about potentially compromising activities and enables appropriate response measures to be taken to remediate any breaches that could arise from using SOAPHound.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1087.002
  • T1069.001
  • T1482
  • T1087.001
  • T1087
  • T1069.002
  • T1069
  • T1059.001
Created: 2024-12-10