
Summary
This analytic rule for Cisco's Network Visibility Module is designed to detect unusual network connections initiated by binaries that typically do not communicate over a network, such as 'notepad.exe', 'calc.exe', or 'mspaint.exe'. By analyzing flow data from Cisco's Network Visibility Module, the rule correlates network activity with process context, focusing on command-line arguments, process paths, and parent process information. Instances where these non-network applications establish outbound connections may indicate suspicious activities like process hollowing or code injection where malicious actors exploit a benign process to obscure nefarious actions. The detection relies on specific search criteria and rules within Splunk to identify these atypical behaviors, providing alerts to potential security incidents that warrant further investigation.
Categories
- Endpoint
Data Sources
- Network Traffic
- Cloud Service
ATT&CK Techniques
- T1055
- T1036
Created: 2025-07-01