heroui logo

System Info Gathering Using Dxdiag Application

Splunk Security Content

View Source
Summary
The detection rule identifies the execution of the dxdiag.exe process when specific command-line arguments are used, indicating system information gathering. This behavior is typically unusual in corporate environments, suggesting potential reconnaissance activity by malicious actors. By leveraging data from Endpoint Detection and Response (EDR) agents, particularly Sysmon and Windows Event Log Security events (EventID 4688), this rule focuses on process creation events. Proper ingestion and normalization of endpoint logs are required for the detection to function effectively. Identifying the execution of this process may assist in uncovering detailed system insights that attackers could use for exploitation or lateral movement within the network, making this a critical aspect of endpoint security monitoring.
Categories
  • Endpoint
Data Sources
  • Pod
  • User Account
  • Process
ATT&CK Techniques
  • T1592
Created: 2024-11-13