SigmaHQ/rules/windows/process_creation/win_susp_ping_hex_ip.yml
2020-10-16 10:06:24 +02:00

30 lines
792 B
YAML

title: Ping Hex IP
id: 1a0d4aba-7668-4365-9ce4-6d79ab088dfd
description: Detects a ping command that uses a hex encoded IP address
references:
- https://github.com/vysec/Aggressor-VYSEC/blob/master/ping.cna
- https://twitter.com/vysecurity/status/977198418354491392
author: Florian Roth
date: 2018/03/23
modified: 2020/10/16
tags:
- attack.defense_evasion
- attack.t1140
- attack.t1027
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- '\ping.exe 0x'
- '\ping 0x'
Image|contains:
- 'ping.exe'
condition: selection
fields:
- ParentCommandLine
falsepositives:
- Unlikely, because no sane admin pings IP addresses in a hexadecimal form
level: high