PUA - Nmap/Zenmap Execution
Detects usage of namp/zenmap. Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation
Sigma rule (View on GitHub)
1title: PUA - Nmap/Zenmap Execution
2id: f6ecd1cf-19b8-4488-97f6-00f0924991a3
3status: test
4description: Detects usage of namp/zenmap. Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation
5references:
6 - https://nmap.org/
7 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-3---port-scan-nmap-for-windows
8author: frack113
9date: 2021-12-10
10modified: 2023-12-11
11tags:
12 - attack.discovery
13 - attack.t1046
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 - Image|endswith:
20 - '\nmap.exe'
21 - '\zennmap.exe'
22 - OriginalFileName:
23 - 'nmap.exe'
24 - 'zennmap.exe'
25 condition: selection
26falsepositives:
27 - Legitimate administrator activity
28level: medium
References
Related rules
- Advanced IP Scanner - File Event
- Linux Network Service Scanning - Auditd
- MacOS Network Service Scanning
- PUA - Advanced IP Scanner Execution
- PUA - Advanced Port Scanner Execution