heroui logo

Network Connection Initiated To AzureWebsites.NET By Non-Browser Process

Sigma Rules

View Source
Summary
This rule is designed to detect unauthorized network connections initiated by non-browser processes targeting the domain "azurewebsites.net". The detection is crucial as this domain is frequently exploited by malicious actors as a host for malware and exfiltration purposes. The rule works by filtering out typical browser executables, allowing only initiations from non-browser processes to trigger an alert. The logic evaluates network connections made where the destination hostname ends with "azurewebsites.net" while checking that the initiating process does not match paths associated with recognized web browsers like Chrome, Firefox, Edge, and others. Such behavior could indicate the presence of malicious software or compromised systems attempting to communicate with a known threat infrastructure.
Categories
  • Network
  • Endpoint
  • Cloud
  • Windows
Data Sources
  • Network Traffic
Created: 2024-06-24