heroui logo

Network Discovery Using Route Windows App

Splunk Security Content

View Source
Summary
This rule detects the execution of the `route.exe` Windows application, which is utilized for network discovery. Adversaries can exploit `route.exe` to gather information about network topology, aiding in lateral movement and further exploitation. The detection primarily stems from Endpoint Detection and Response (EDR) agents, analyzing process creation events. It leverages data from multiple sources, particularly focusing on Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2. False positives may arise from legitimate administrative activities or automated scripts used by network operators, thus caution is advised when interpreting alerts. The detection mechanism aggregates statistics on the process's execution and factors associated with its activity, helping identify potentially malicious behavior efficiently.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • File
ATT&CK Techniques
  • T1016
  • T1016.001
Created: 2024-11-13