heroui logo

Windows Gather Victim Network Info Through Ip Check Web Services

Splunk Security Content

View Source
Summary
This hunting rule targets processes that attempt to connect to known IP-check web services by monitoring DNS queries captured in Sysmon EventCode 22 logs. It specifically tracks requests to services like "wtfismyip.com" and "ipinfo.io". These types of queries are often associated with malware such as Trickbot, which uses them for reconnaissance to identify the infected machine's external IP address. By detecting such behavior, the analytic provides insight into potential reconnaissance activities that could precede further attacks or lateral movement within an organization's network. The rule facilitates the identification of malicious activities by summarizing the occurrences of these DNS queries, which can help security teams respond proactively to emerging threats.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1590.005
  • T1590
Created: 2024-12-10