heroui logo

Advanced Port Scanner Execution

Anvilogic Forge

View Source
Summary
The Advanced Port Scanner Execution detection rule aims to identify the execution of the Advanced Port Scanner application within a network environment. It specifically targets instances where this tool is being used, which could indicate reconnaissance activities by threat actors, particularly those associated with the Rhysida ransomware group. The rule is built using Splunk and employs queries that track the process name 'advanced_port_scanner.exe'. This detection is critical because Advanced Port Scanner is often misused by adversaries to discover open ports and retrieve information about services and applications running on target systems. By monitoring process execution and collecting pertinent details such as time, host, user, and associated parent process, security teams can quickly respond to potential threats that leverage this tool for malicious purposes.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T1046
Created: 2024-02-09