New

The executive guide to generative AI

Read more

通过 Internet Explorer 的潜在命令和控制

编辑

通过 Internet Explorer 的潜在命令和控制

编辑

识别通过组件对象模型 (COM) 启动的 Internet Explorer (iexplore.exe) 建立异常网络连接的实例。攻击者可能滥用通过 COM 启动的 Internet Explorer 来避免可疑进程建立网络连接并绕过基于主机的防火墙限制。

规则类型: eql

规则索引:

  • logs-endpoint.events.library-*
  • logs-endpoint.events.process-*
  • logs-endpoint.events.network-*

严重性: 中

风险评分: 47

运行频率: 5 分钟

搜索索引时间范围: now-9m (日期数学格式,另请参阅 其他回溯时间)

每次执行的最大警报数: 100

参考: 无

标签:

  • 域: 端点
  • 操作系统: Windows
  • 用例: 威胁检测
  • 战术: 命令和控制
  • 数据源: Elastic Defend

版本: 106

规则作者:

  • Elastic

规则许可: Elastic License v2

规则查询

编辑
sequence by host.id, user.name with maxspan = 5s
  [library where host.os.type == "windows" and dll.name : "IEProxy.dll" and process.name : ("rundll32.exe", "regsvr32.exe")]
  [process where host.os.type == "windows" and event.type == "start" and process.parent.name : "iexplore.exe" and process.parent.args : "-Embedding"]
  /* IE started via COM in normal conditions makes few connections, mainly to Microsoft and OCSP related domains, add FPs here */
  [network where host.os.type == "windows" and network.protocol == "dns" and process.name : "iexplore.exe" and
   not dns.question.name :
   (
    "*.microsoft.com",
    "*.digicert.com",
    "*.msocsp.com",
    "*.windowsupdate.com",
    "*.bing.com",
    "*.identrust.com",
    "*.sharepoint.com",
    "*.office365.com",
    "*.office.com"
    )
  ] /* with runs=5 */

框架: MITRE ATT&CKTM

On this page

Was this helpful?
Feedback