
Summary
This rule detects potential system network configuration discovery activities by monitoring the rapid execution of certain processes associated with network mapping. The analytic leverages data sourced from Endpoint Detection and Response (EDR) tools such as Sysmon and Windows Event Log. It specifically tracks process GUIDs, command-line executions, and parent processes to identify unusual patterns that suggest an attacker may be attempting to discover the network topology in preparation for lateral movement or exploitation. By establishing thresholds for rapid successive events, this detection intends to capture sequences that far exceed typical user behavior, which could indicate a compromising scenario leading to data breaches or system exploitation. The rule's importance lies in its ability to provide early warning signs of potential network reconnaissance activities associated with attacker methodologies.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1016
Created: 2025-01-20