heroui logo

Windows Excessive Usage Of Net App

Splunk Security Content

View Source
Summary
This detection rule identifies potential malicious activity associated with excessive usage of `net.exe`, specifically looking for instances where the tool is executed frequently (10 times or more) within a one-minute timeframe. The detection draws from various Windows endpoint data sources, including Sysmon and Windows Event Logs, which capture process activities such as process names, parent processes, and command-line arguments. This heightened occurrence may suggest that an attacker is attempting to manipulate user accounts, a behavior observed in cases of cryptocurrency mining attacks, particularly with Monero. Such activity could indicate unauthorized access or a system compromise, compromising user integrity and opening avenues for further attacks. The rule utilizes Splunk's data modeling capabilities to process and interrogate telemetry data effectively, facilitating the identification of this anomaly and alerting security teams to potentially malicious actions in a timely manner.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
  • Script
  • Process
ATT&CK Techniques
  • T1531
Created: 2025-01-13