heroui logo

Suspicious Wordpad Outbound Connections

Sigma Rules

View Source
Summary
This rule aims to detect suspicious outbound network connections initiated by 'wordpad.exe' that occur over uncommon destination ports. The rationale behind this detection is that legitimate instances of WordPad should typically communicate over well-known ports such as 80 (HTTP), 443 (HTTPS), 139 (NetBIOS), and others defined in the filter (445, 465, 587, 993, 995). If WordPad is found making outbound connections to ports outside of this predefined list, it could suggest potential malicious activity, such as process injection or command-and-control (C2) communications initiated by malware disguising itself as a legitimate application. The rule uses a logical selection to identify connections where 'wordpad.exe' is the initiating process and filters to exclude established main ports, focusing on potential anomalies. Any detection triggered by this rule should be investigated, as it may indicate compromised systems trying to communicate externally using common software artifacts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Process
Created: 2023-07-12