Nslookup Local
Detects use of nslookup to look up the local nameserver as part of host discovery
Sigma rule (View on GitHub)
1title: Nslookup Local
2id: ffef5004-f1ec-48bb-8662-8dfd4f9a4902
3status: Experimental
4description: Detects use of nslookup to look up the local nameserver as part of host discovery
5author: _pete_0, TheDFIRReport
6references:
7 - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/nslookup
8 - https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts
9date: 2023/01/08
10logsource:
11 category: process_creation
12 product: windows
13detection:
14 selection:
15 Image|endswith:
16 - '\nslookup.exe'
17 CommandLine|contains:
18 - '127.0.0.1'
19 ParentImage|endswith:
20 - '\cmd.exe'
21 ParentCommandLine|contains:
22 - '/c'
23 condition: selection
24fields:
25 - CommandLine
26 - ParentCommandLine
27falsepositives:
28 - Administrators, helpdesk
29level: high
30tags:
31 - attack.discovery
32 - attack.t1016
References
Related rules
- Driverquery Lookup
- System Time Lookup
- CHCP CodePage Locale Lookup
- Emotet Child Process Spawn Pattern