heroui logo

Cisco NVM - Suspicious Network Connection From Process With No Args

Splunk Security Content

View Source
Summary
This detection rule focuses on identifying potentially malicious behavior exhibited by common Windows processes when they initiate network connections without any command-line arguments. It utilizes data from the Cisco Network Visibility Module to detect such behaviors, which may indicate process injection techniques often used by malware to hide execution. Processes like `rundll32.exe`, `regsvr32.exe`, `svchost.exe`, and others are legitimate but can also be exploited in post-exploitation activities, like those seen with tools such as Cobalt Strike. The rule specifically flags connections made by these binaries when they lack command-line context, which raises suspicion of their legitimacy and signals possible communication with command and control (C&C) servers. The implementation requires the integration of Cisco NVM flow data into a Splunk environment with specific macro configurations for accurate detection and filtering of known false positives.
Categories
  • Network
  • Endpoint
  • Windows
  • On-Premise
Data Sources
  • Network Traffic
ATT&CK Techniques
  • T1055
  • T1218
Created: 2025-07-02