Suspicious Wordpad Outbound Connections
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects a network connection initiated by "wordpad.exe" over uncommon destination ports. This might indicate potential process injection activity from a beacon or similar mechanisms.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "sa_network_connection" AND (IS_INITIATED = "true" AND PROCESSNAME endswith "\wordpad.exe") AND DEST_PORT != "80,139,443,445,465,587,993,995" select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.PROCESSNAME,Action1.DESTINATIONHOST,Action1.DESTINATION_IPV6,Action1.DEST_IP,Action1.SOURCEHOST,Action1.SOURCE_IP,Action1.SOURCE_IPV6
Detection
Execution Mode
realtime
Log Sources
Windows
Author
X__Junior (Nextron Systems)


