heroui logo

Windows Visual Basic Commandline Compiler DNSQuery

Splunk Security Content

View Source
Summary
This detection rule focuses on identifying suspicious DNS queries made by the Windows Visual Basic Command Line Compiler (vbc.exe). Typically, vbc.exe is used locally to compile Visual Basic code and does not require internet access, making any DNS queries from this process highly suspect. Such behavior may indicate a malicious actor attempting to use the legitimate vbc.exe process to connect to command-and-control (C2) servers, resolve domains for data exfiltration, or download further malware payloads. Security analysts should investigate the context of the dns query, including the process's parent, command-line arguments, and the resolved domains to gain insights into potential malicious activity.
Categories
  • Endpoint
Data Sources
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1071.004
Created: 2025-09-30