
Summary
This rule detects suspicious network command activities executed on Windows systems by monitoring process creation events. Adversaries often seek detailed information about system network configurations for further reconnaissance and potential exploitation. The rule specifically looks for command-line arguments that include various network configuration commands such as 'ipconfig /all', 'netsh interface show interface', 'arp -a', 'nbtstat -n', 'net config', and 'route print'. If a process is created with any of these commands in its command line, the rule triggers a detection alert. Although these commands can be used for legitimate administrative tasks, they can also indicate malicious activity when executed unexpectedly or by unauthorized users. The detection is designed to minimize false positives by including potential benign usage scenarios, such as an administrator asking a user about network configurations, which may lead to a false identification of malicious intent. It is ideal for environments where network configuration data is sensitive, and unauthorized access could lead to information leakage or system compromise.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1016
Created: 2021-12-07