heroui logo

ngen.exe File Download

Anvilogic Forge

View Source
Summary
The detection rule identifies potentially malicious usage of ngen.exe, which is a legitimate Windows process responsible for compiling .NET assemblies into native machine code for performance optimization. Threat actors can exploit this binary to download files from external sources, a behavior not typical of this process in normal operation. The rule leverages Windows Sysmon event data to detect executions of ngen.exe that include commands indicative of file download actions from remote locations. By filtering for event code 1 (process creation), the logic specifically targets instances where ngen.exe is invoked with arguments that imply downloading files, capturing significant attributes such as the host, user, and parent processes involved. The detection method described utilizes the Splunk query language for effective parsing and data aggregation, and it aligns with the MITRE ATT&CK technique T1105 (Ingress Tool Transfer), which covers scenarios where adversaries transfer tools and payloads into compromised systems.
Categories
  • Windows
Data Sources
  • Process
  • Logon Session
  • Windows Registry
ATT&CK Techniques
  • T1105
Created: 2024-02-09