heroui logo

Cisco NVM - Suspicious Network Connection Initiated via MsXsl

Splunk Security Content

View Source
Summary
This rule detects the use of `msxsl.exe`, a legitimate Microsoft utility for XSLT transformations, which has been identified to be exploited by adversaries to initiate network connections to non-private IP addresses. Such behavior may indicate command and control (C2) activities or data exfiltration. The detection relies on telemetry from the Cisco Network Visibility Module (NVM), specifically observing flow data where `msxsl.exe` is the process initiating these connections. The rule detects instances where the destination IP address does not fall within known private IP address ranges, highlighting potentially malicious activities.
Categories
  • Network
  • Endpoint
Data Sources
  • Network Traffic
ATT&CK Techniques
  • T1220
Created: 2025-07-03