heroui logo

Windows Odbcconf Hunting

Splunk Security Content

View Source
Summary
The 'Windows Odbcconf Hunting' analytic is designed to detect the execution of 'Odbcconf.exe', a process that can be misused by attackers to execute arbitrary commands or load malicious DLLs. This detection utilizes data from Endpoint Detection and Response (EDR) solutions, filtering on process creation events specifically for 'Odbcconf.exe'. Given the potential for this activity to enable code execution or persistence in a compromised environment, timely detection is critical. The analysis aggregates data from Sysmon EventID 1 and Windows Event Log Security 4688, as well as from CrowdStrike ProcessRollup2. The rule helps identify potentially malicious behaviors that could elevate the threat level of an attacker trying to maintain access to a system or expand their activities.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1218.008
Created: 2024-11-13