
Summary
The 'Delayed Execution via Ping' detection rule aims to identify the execution of common Windows utilities via a delayed execution of 'ping.exe', often utilized by attackers during malware installation phases to avoid detection. The rule specifically employs EQL (Event Query Language) to track sequences of process executions stemming from the command line interface. It looks for instances in which 'ping.exe' is executed with specific arguments ('-n') followed by the invocation of potentially malicious executables like 'rundll32.exe' and 'powershell.exe'. This behavior is indicative of tactics used to create time gaps between command launches, making detection by security applications more challenging. The rule negates benign execution paths and focuses on excluding previously whitelisted processes, ensuring a higher signal-to-noise ratio for alerts. Possible investigation steps include analyzing process trees, verifying user account legitimacy, and scrutinizing command-line arguments for malicious indicators.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Command
ATT&CK Techniques
- T1059
- T1059.001
- T1059.005
- T1216
- T1218
- T1218.003
- T1218.004
- T1218.005
- T1218.009
- T1218.010
- T1218.011
- T1220
- T1497
- T1497.003
Created: 2023-09-25