HackTool - Htran/NATBypass Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects execution of Htran or Htran-like proxy tools such as NATBypass by identifying common executable names and command-line flags typically used to create covert network tunnels.

Severity

Trouble

Rule journey

Attack chain scenario

Execution → Command and Control (T1090: Proxy)

Impact

Enables adversaries to proxy network traffic covertly, bypass network defenses, and maintain persistent communication with compromised systems.

Rule Requirement

Prerequisites

Process creation auditing with command-line logging enabled. Presence of Htran or similar tunneling tools executing with typical proxy-related parameters.

Criteria

Action1: actionname = "Process started" AND PROCESSNAME endswith "\htran.exe,\lcx.exe" OR COMMANDLINE contains ".exe -tran ,.exe -slave " select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

MITRE ATT&CK

T1090: Command and Control - Proxy

Security Standards

  • Network traffic filtering to block communications with known anonymity networks and adversary infrastructure
  • Network intrusion detection and prevention systems configured with rules for known C2 protocols
  • SSL/TLS inspection to detect covert or domain fronting traffic

Author

Florian Roth (Nextron Systems)

Future actions

Known False Positives

Unknown

Next Steps

  • Investigate suspicious executions of htran.exe, lcx.exe, or related command-line parameters
  • Apply network filtering and intrusion prevention to block proxy/tunneling communications
  • Enable encrypted traffic inspection where feasible to detect evasive techniques
  • Maintain enhanced logging and monitoring of process creation and network events for proactive detection

Mitigation

Mitigation ID

Name

Description

M1037

Filter Network Traffic

Block traffic to known anonymity networks and C2 infrastructure using network allow and block lists to disrupt proxy tools.

M1031

Network Intrusion Prevention

Deploy network intrusion detection and prevention systems with signatures for known adversary proxy and tunneling techniques.

M1020

SSL/TLS Inspection

Inspect encrypted HTTPS traffic to detect domain fronting and covert proxy channels used by tools like Htran/NATBypass.