
Summary
This detection rule targets the misuse of netsh.exe, a network configuration utility, which can be leveraged by attackers to manipulate network settings and achieve persistence. It identifies instances where processes invoke netsh.exe, collecting data from various sources, including Sysmon and Windows Event Logs, to analyze process relationships like parent-child hierarchies. As netsh.exe can execute arbitrary commands and potentially load malicious DLLs, monitoring its usage is crucial for maintaining network security. The rule is designed to be implemented within Splunk using Endpoint Detection and Response (EDR) data, focusing on both known behaviors and anomalous activities surrounding netsh.exe usage.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1562.004
- T1562
Created: 2024-11-13