
Summary
The 'Windows Short Lived DNS Record' detection rule aims to identify malicious activities within Active Directory environments related to the rapid creation and deletion of DNS objects. This analytic captures two specific Windows Security Event Codes - 5136 (modification of an object) and 5137 (creation of an object). The rule specifically looks for DNS entries (identified by ObjectClass="dnsNode") that are created and then deleted within a 300-second timeframe, which suggests possible abuse of DNS by attackers. The detection leverages the ability to track the timestamps of these events and utilizes statistical analysis to identify anomalies in the duration between them. A successful trigger of this rule indicates that temporary DNS entries may have been created for nefarious purposes, potentially resulting in malicious network traffic and a heightened risk of system compromise.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1071.004
- T1557.001
- T1187
Created: 2025-11-13