Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suspicious Process DNS Query Known Abuse Web Services #4748

Open
cY83rR0H1t opened this issue Mar 1, 2024 · 0 comments
Open

Suspicious Process DNS Query Known Abuse Web Services #4748

cY83rR0H1t opened this issue Mar 1, 2024 · 0 comments
Assignees

Comments

@cY83rR0H1t
Copy link

Description of the Idea of the Rule

A suspicious process engaging in a DNS query has been identified through the analysis of known-abuse web services. This analytical approach detects questionable activities involving text-paste web services, VoIP, instant messaging, and digital distribution platforms, commonly exploited by adversaries, malware actors, and red teams. This technique is often utilized to either download malicious files or function as a Command and Control (C2) server.

Public References / Example Event Log

title: Suspicious Process DNS Query Known Abuse Web Services
id: a0a3e36d-23e2-4199-a681-1f56b3c75f14
status: stable
references:
    - https://www.splunk.com/en_us/blog/security/unveiling-phemedrone-stealer-threat-analysis-and-detections.html
author: Rohit Jain
date: 2024/03/01
tags:
    - attack.T1059
    - atatck.execution
logsource:
    product: windows
    category: dns_query
detection:
    selection1:
        QueryName|contains:
            - pastebin
            - discord
            - api.telegram
            - t.me
        Image|endswith|contains:
            - \cmd.exe
            - \powershell.exe
            - \pwsh.exe
            - \wscript.exe
            - \cscript.exe
    selection2:
        QueryName|contains:
            - pastebin
            - discord
            - api.telegram
            - t.me
        Image|contains:
            - (?i)\\users\\public\\.*
            - (?i)\\programdata\\.*
            - (?i)\\temp\\.*
            - (?i)\\Windows\\Tasks\\.*
            - (?i)\\appdata\\.*
            - (?i)\\perflogs\\.*
    condition: selection1 or selection2
falsepositives:
    - Unknown
level: medium
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants