heroui logo

Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location

Sigma Rules

View Source
Summary
The detection rule monitors network connections initiated by processes that are running from potentially suspicious or uncommon file system locations. It specifically tracks instances where processes, identified by an 'Initiated' status, attempt to establish a network connection while residing in directories that are generally not associated with legitimate software execution, such as '$Recycle.bin', 'C:\Temp\', and other uncommon system folders. Furthermore, the rule focuses on filtering out traffic destined for specific main domains associated with non-traditional file hosting services, potentially indicating malicious activity targeting command-and-control servers or data exfiltration points. This is indicative of behaviors often seen in malware activity, warranting a high-level alert when detected.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
Created: 2017-03-19