heroui logo

Detect processes used for System Network Configuration Discovery

Splunk Security Content

View Source
Summary
The detection rule aims to identify unusual activities involving processes related to system network configuration discovery, indicating potential attacker behavior on endpoints. Specifically, it captures the rapid execution of processes, their parent processes, and associated command-line arguments by utilizing data from Endpoint Detection and Response (EDR) solutions like Sysmon and CrowdStrike. Such behavior is significant, as it is often indicative of an attacker attempting to map the network—a precursor to lateral movement, data exfiltration, or other exploitative actions. Although designed to address malicious behavior, the rule has been deprecated due to its inclination to produce false positives, particularly from legitimate system administrator activities that occasionally involve network discovery commands.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1016
Created: 2025-01-24