
Summary
The Windows Time Based Evasion detection rule identifies potentially malicious activities related to the execution of the 'ping' command with an invalid IP address, specifically the command 'ping 0 -n'. This technique is frequently exploited by malware for evasion purposes, such as introducing time delays to hinder detection by security mechanisms. The rule leverages data sourced from Sysmon and Windows Event Logs, specifically Event ID 1 and 4688, along with CrowdStrike’s ProcessRollup2. By aggregating events from these data sources, the detection highlights command-line executions that match the specified criteria, indicating a possible attempt to evade detection or perform malicious activities. This behavior is particularly linked to malware families like NJRAT, which utilize such tactics to delay self-deletion and maintain persistence in the infected environment. The rule provides a robust approach to capture this suspicious activity, allowing organizations to respond to potential threats promptly.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
ATT&CK Techniques
- T1497
- T1497.003
Created: 2024-11-13