heroui logo

DNS Query Request To OneLaunch Update Service

Sigma Rules

View Source
Summary
This detection rule monitors DNS query requests directed at the domain "update.onelaunch.com," which is linked to the OneLaunch adware application. Upon installation, OneLaunch frequently checks this domain for updates, which can signal malicious behavior aimed at delivering unwanted software to users. By identifying DNS queries to this domain, the rule helps in ensuring that systems are not inadvertently communicating with known sources of adware that can lead to privacy breaches and potential exploitation. The rule is structured to trigger when the DNS query specifically targets the OneLaunch update domain and is initiated by processes ending with "\OneLaunch.exe." This targeted approach minimizes false positives since it both identifies the specific domain and correlates it with the executable known to be involved in the OneLaunch operations, positioning it as a useful alert mechanism for identifying possible adware activity in a Windows environment.
Categories
  • Windows
  • Network
Data Sources
  • Domain Name
  • Network Traffic
  • Application Log
Created: 2024-02-26