heroui logo

Windows System Remote Discovery With Query

Splunk Security Content

View Source
Summary
This detection rule identifies the execution of `query.exe` with specific command-line arguments that imply attempts to discover data on remote devices. This analytic leverages telemetry from Endpoint Detection and Response (EDR) solutions, focusing primarily on process names and their command-line arguments. The detection is pertinent as malicious actors can employ `query.exe` to gain insights into the network environment, including Active Directory details on compromised endpoints. If this behavior is confirmed as malicious, it can enable attackers to gather crucial information that supports lateral movement and privilege escalation within an organization’s network.
Categories
  • Endpoint
  • Windows
  • On-Premise
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1033
Created: 2025-02-05