
Summary
The detection rule identifies the execution of 3proxy, a lightweight proxy server that can be used for legitimate purposes but is often abused by threat actors for command and control (C2) infrastructure. The rule focuses on monitoring process creation events on Windows systems, specifically looking for instances where '3proxy.exe' is executed. It uses a combination of signatures based on the image name, PE file description, and command-line parameters to detect potential misuse. By checking if any of these conditions are met, the rule generates alerts for further investigation. False positives may occur because administrative activities sometimes involve the use of proxy servers for benign reasons.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-09-13