
Summary
This detection rule identifies network connections that are initiated by the process IMEWDBLD.EXE, which is a known LOLBIN (Living Off The Land Binary). LOLBINs are legitimate executables that can be abused for malicious purposes, and in this case, the detection is focused on the potential misuse of IMEWDBLD.EXE to download arbitrary files or additional payloads from the internet. The rule captures instances where the initiated flag is set to true and the process name ends with 'IMEWDBLD.exe'. Given the capabilities of this executable, detecting its network connections can be critical in identifying potential command-and-control (C2) activities or data exfiltration attempts. The rule is categorized under high severity level, highlighting the importance of monitoring such behavior for potential threats in a Windows environment. The references provided include additional context regarding the exploitation of this executable and related threat tactics.
Categories
- Windows
- Network
Data Sources
- Process
- Network Traffic
ATT&CK Techniques
- T1105
Created: 2022-01-22