PUA - SoftPerfect Netscan Execution
Detects usage of SoftPerfect's "netscan.exe". An application for scanning networks. It is actively used in-the-wild by threat actors to inspect and understand the network architecture of a victim.
Sigma rule (View on GitHub)
1title: PUA - SoftPerfect Netscan Execution
2id: ca387a8e-1c84-4da3-9993-028b45342d30
3status: experimental
4description: |
5 Detects usage of SoftPerfect's "netscan.exe". An application for scanning networks.
6 It is actively used in-the-wild by threat actors to inspect and understand the network architecture of a victim.
7references:
8 - https://www.protect.airbus.com/blog/uncovering-cyber-intruders-netscan/
9 - https://secjoes-reports.s3.eu-central-1.amazonaws.com/Sockbot%2Bin%2BGoLand.pdf
10 - https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/
11 - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/yanluowang-ransomware-attacks-continue
12 - https://research.nccgroup.com/2022/07/13/climbing-mount-everest-black-byte-bytes-back/
13 - https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-hive-ransomware/
14 - https://www.softperfect.com/products/networkscanner/
15author: '@d4ns4n_ (Wuerth-Phoenix)'
16date: 2024-04-25
17tags:
18 - attack.discovery
19 - attack.t1046
20logsource:
21 category: process_creation
22 product: windows
23detection:
24 selection:
25 - Image|endswith: '\netscan.exe'
26 - Product: 'Network Scanner'
27 - Description: 'Application for scanning networks'
28 condition: selection
29falsepositives:
30 - Legitimate administrator activity
31level: medium
References
Related rules
- Advanced IP Scanner - File Event
- Linux Network Service Scanning - Auditd
- MacOS Network Service Scanning
- PUA - Advanced IP Scanner Execution
- PUA - Advanced Port Scanner Execution