Skip to content

Commit 6c56883

Browse files
committed
updating the search for better output
1 parent 808a674 commit 6c56883

File tree

1 file changed

+21
-12
lines changed

1 file changed

+21
-12
lines changed

detections/endpoint/windows_installutil_remote_network_connection.yml

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows InstallUtil Remote Network Connection
22
id: 4fbf9270-43da-11ec-9486-acde48001122
3-
version: 10
4-
date: '2025-02-10'
3+
version: 11
4+
date: '2025-02-22'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -16,15 +16,24 @@ description: The following analytic detects the Windows InstallUtil.exe binary m
1616
of this activity.
1717
data_source:
1818
- Sysmon EventID 1 AND Sysmon EventID 3
19-
search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
20-
where `process_installutil` by _time span=1h Processes.process_id Processes.process_name
21-
Processes.dest Processes.user Processes.process_path Processes.process Processes.parent_process_name
22-
Processes.original_file_name | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
23-
| `security_content_ctime(lastTime)` | join process_id [| tstats `security_content_summariesonly`
24-
count FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port !=
25-
0 by All_Traffic.process_id All_Traffic.dest All_Traffic.dest_port | `drop_dm_object_name(All_Traffic)`
26-
| rename dest as C2 ] | table _time user dest parent_process_name process_name process_path
27-
process process_id dest_port C2 | `windows_installutil_remote_network_connection_filter`'
19+
search: |-
20+
| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
21+
where `process_installutil` by _time span=1h Processes.process_id Processes.process_name
22+
Processes.dest Processes.user Processes.process_path Processes.process Processes.parent_process_name
23+
Processes.original_file_name
24+
| `drop_dm_object_name(Processes)`
25+
| `security_content_ctime(firstTime)`
26+
| `security_content_ctime(lastTime)`
27+
| join process_id
28+
[| tstats `security_content_summariesonly`
29+
count FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port !=
30+
0 by All_Traffic.process_id All_Traffic.dest All_Traffic.dest_port
31+
| `drop_dm_object_name(All_Traffic)`
32+
| rename dest as C2 ]
33+
| table _time user dest parent_process_name process_name process_path process process_id dest_port C2
34+
| stats count min(_time) as firstTime max(_time) as lastTime values(process) as process values(C2) as command_and_control by user dest process_name process_id dest_port parent_process_name
35+
| `security_content_ctime(firstTime)`
36+
| `security_content_ctime(lastTime)`| `windows_installutil_remote_network_connection_filter`
2837
how_to_implement: The detection is based on data that originates from Endpoint Detection
2938
and Response (EDR) agents. These agents are designed to provide security-related
3039
telemetry from the endpoints where the agent is installed. To implement this search,
@@ -55,7 +64,7 @@ drilldown_searches:
5564
latest_offset: $info_max_time$
5665
rba:
5766
message: An instance of $parent_process_name$ spawning $process_name$ was identified
58-
on endpoint $dest$ generating a remote download.
67+
on endpoint $dest$ generating a remote download from $
5968
risk_objects:
6069
- field: user
6170
type: user

0 commit comments

Comments
 (0)