heroui logo

Windows SSH Proxy Command

Splunk Security Content

View Source
Summary
This detection rule aims to identify potential abuse of the SSH ProxyCommand feature within Windows by monitoring specific process execution patterns. It specifically looks for cases where the ssh.exe executable, as a parent process, contains the argument 'ProxyCommand' and subsequently spawns certain child processes like mshta, powershell, wscript, or cscript. All such processes with 'http' in their command lines are also monitored. This behavior is often leveraged by attackers to execute arbitrary commands via SSH proxies, which can facilitate command-and-control activities or remote code execution. The rule focuses on the use of commonly abused Windows scripting engines and potential web requests made through these executables, which may signify malicious activities when triggered by SSH proxy commands.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1572
  • T1059.001
  • T1105
Created: 2025-03-24