heroui logo

Windows Abused Web Services

Splunk Security Content

View Source
Summary
This detection rule highlights suspicious DNS queries made by processes to known abused web services, which could indicate potential adversarial activity or malicious downloads. Utilizing Sysmon Event ID 22, the detection identifies requests to specific domains commonly implicated in nefarious operations like paste sites and instant messaging platforms. The rule focuses on establishing a correlation between the executing process and the nature of the DNS queries made to assess the risk of initial access attacks that could lead to further compromise of the host. Security teams are advised to run this detection regularly, while also being mindful of potential false positives stemming from internal usage of legitimate services.
Categories
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1102
Created: 2024-11-13