Suspicious Network Command
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems
Severity
Attention
Rule Requirement
Criteria
Action1: actionname = "Process started" AND COMMANDLINE contains "ipconfig /all,netsh interface show interface,arp -a,nbtstat -n,net config,route print" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'


