heroui logo

wuauclt.exe Network Connection

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying potential abuse of the `wuauclt.exe` executable, which is the Windows Update client. The executable can be manipulated to proxy the execution of unauthorized code, aligning with tactics documented in the Living Off the Land Binaries (LOLBAS) project. This rule captures network connection events related to `wuauclt.exe`, while excluding connections to known Microsoft IP addresses, which are deemed normal behavior. The logic uses Splunk's event filtering capabilities to detect instances of `wuauclt.exe` establishing network connections. Alerts generated by this rule could indicate malicious activity, particularly attempts by adversaries to use this binary for evasion techniques, such as system binary proxy execution. The rule aims to identify anomalies in the usage of `wuauclt.exe` that may suggest hostile actions or breaches in security posture.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Network Traffic
  • Windows Registry
ATT&CK Techniques
  • T1218
Created: 2024-02-09