
Summary
This detection rule identifies a pattern of multiple (15) executions of the `nslookup.exe` command from the same host, which may indicate potential command and control (C2) activity via DNS tunneling. Specifically, the rule triggers when there are multiple `nslookup.exe` executions with explicit query types within a 5-minute period. The primary concern is that attackers can leverage DNS queries to bypass network security controls, issuing commands or exfiltrating data through DNS protocol misuse. Additionally, the rule provides guidance for investigation and response, highlighting the need to analyze parent processes, inspect DNS queries, and assess potential indicators of compromise (IoCs).
Categories
- Endpoint
- Windows
- Cloud
Data Sources
- Process
- Windows Registry
- Network Traffic
- Application Log
- Service
ATT&CK Techniques
- T1071
- T1071.004
- T1572
Created: 2020-11-11