PktMon.EXE Execution
Detects execution of PktMon, a tool that captures network packets.
Sigma rule (View on GitHub)
 1title: PktMon.EXE Execution
 2id: f956c7c1-0f60-4bc5-b7d7-b39ab3c08908
 3status: test
 4description: Detects execution of PktMon, a tool that captures network packets.
 5references:
 6    - https://lolbas-project.github.io/lolbas/Binaries/Pktmon/
 7author: frack113
 8date: 2022-03-17
 9modified: 2023-06-23
10tags:
11    - attack.discovery
12    - attack.credential-access
13    - attack.t1040
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        - Image|endswith: '\pktmon.exe'
20        - OriginalFileName: 'PktMon.exe'
21    condition: selection
22falsepositives:
23    - Legitimate use
24level: medium
References
Related rules
- Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock
- Cisco Sniffing
- Harvesting Of Wifi Credentials Via Netsh.EXE
- Network Sniffing - Linux
- Network Sniffing - MacOs
