1
1
name : Ping Sleep Batch Command
2
2
id : ce058d6c-79f2-11ec-b476-acde48001122
3
- version : 9
4
- date : ' 2025-05-02 '
3
+ version : 10
4
+ date : ' 2025-05-19 '
5
5
author : Teoderick Contreras, Splunk
6
6
status : production
7
7
type : Anomaly
8
- description : The following analytic identifies the execution of ping sleep batch commands.
8
+ description : |
9
+ The following analytic identifies the execution of ping sleep batch commands.
9
10
It leverages data from Endpoint Detection and Response (EDR) agents, focusing on
10
11
process and parent process command-line details. This activity is significant as
11
12
it indicates an attempt to delay malicious code execution, potentially evading detection
@@ -17,9 +18,21 @@ data_source:
17
18
- Sysmon EventID 1
18
19
- CrowdStrike ProcessRollup2
19
20
search : ' | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
20
- as lastTime from datamodel=Endpoint.Processes where `process_ping` (Processes.parent_process
21
- = "*ping*" Processes.parent_process = *-n* Processes.parent_process="* Nul*"Processes.parent_process="*>*")
22
- OR (Processes.process = "*ping*" Processes.process = *-n* Processes.process="* Nul*"Processes.process="*>*")
21
+ as lastTime from datamodel=Endpoint.Processes where
22
+ (
23
+ Processes.parent_process= "*ping*"
24
+ Processes.parent_process = *-n*
25
+ Processes.parent_process="* Nul*"
26
+ Processes.parent_process IN ("*>*", "*>*")
27
+ Processes.parent_process IN ("*&*", "*& *")
28
+ )
29
+ OR (
30
+ Processes.process = "*ping*"
31
+ Processes.process = *-n*
32
+ Processes.process="* Nul*"
33
+ Processes.process IN ("*>*", "*>*")
34
+ Processes.process IN ("*&*", "*& *")
35
+ )
23
36
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process
24
37
Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id
25
38
Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec
0 commit comments