Skip to content

[Rule Tuning] Unusual Network Activity from a Windows System Binary #4998

@tyler-mcadam

Description

@tyler-mcadam

Link to Rule

https://github.com/elastic/detection-rules/blob/main/rules/windows/defense_evasion_network_connection_from_windows_binary.toml

Rule Tuning Type

False Positives - Reducing benign events mistakenly identified as threats.

Description

I may be missing something but it looks like this alert can FP because of the dns.question.name exclusions and the fact that the field won't appear in the connection records after the domain is resolved. Is there a reason not to limit the network portion to DNS lookups?

Example Data

msiexec process create -> msiexec queries acroipm2.adobe.com -> msiexec connects to the resolved IP

It looks like the DNS query is essentially being ignored because the rule only needs the process and the connection to X.X.X.X

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions