
Summary
The provided PowerShell Module rule utilizes the 'Get-NetTCPConnection' cmdlet to identify network connections made to or from a Windows system. This functionality allows adversaries to gather intelligence on existing connections, which could lead to further malicious actions, such as lateral movement or data exfiltration. The detection rule targets contexts where there's evidence of this cmdlet being executed, indicating possible reconnaissance activities by an attacker. False positives are categorized as 'Unknown', signifying a need for context when interpreting detected instances. The rule reflects a low-level threat indicator, emphasizing its utility in identifying potentially indicative behavior without necessarily confirming malicious intent.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1049
Created: 2021-12-10