Unusual Network Connection via DllHost
The rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.
The detection rule identifies unusual instances of dllhost.exe making outbound network connections, which may indicate adversarial command and control activity. Dllhost.exe is a legitimate Windows process used to host DLL services. Adversaries may exploit it for stealthy command and control by initiating unauthorized network connections to non-local IPs. This approach helps in identifying potential threats by focusing on unusual network behaviors associated with this process. The rule aims to detect activity related to defense evasion, where adversaries use system binaries to proxy execution. The detection logic relies on identifying dllhost.exe processes initiating network connections to destinations outside of commonly used private IP ranges.
Attack Chain
- An attacker gains initial access to a Windows system (e.g., via phishing or exploitation).
- The attacker executes a malicious DLL file on the compromised system.
- The attacker uses dllhost.exe to host and execute the malicious DLL.
- The malicious DLL initiates a network connection to an external IP address, bypassing traditional process-based network monitoring.
- The attacker establishes a command and control (C2) channel via the dllhost.exe process.
- The attacker uses the C2 channel to send commands and receive data from the compromised system.
- The attacker performs lateral movement within the network.
- The attacker exfiltrates sensitive data from the compromised network.
Impact
A successful attack can lead to the establishment of a covert command and control channel, allowing attackers to remotely control the compromised system. This can result in data theft, further compromise of the network, and potential financial loss. The references point to APT29 activity, suggesting sophisticated actors may leverage this technique.
Recommendation
- Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to enhance visibility of process execution and network activity (https://ela.st/sysmon-event-1-setup, https://ela.st/sysmon-event-3-setup).
- Deploy the Sigma rule
Unusual Network Connection via DllHostto your SIEM to detect suspicious outbound connections from dllhost.exe. - Investigate and whitelist legitimate software updates or enterprise applications that use dllhost.exe for network communications to reduce false positives, as described in the rule’s analysis notes.
Detection coverage 2
Unusual Network Connection via DllHost
mediumDetects unusual network connections initiated by dllhost.exe, excluding connections to private IP ranges.
DllHost Process Started with Single Argument
lowDetects dllhost.exe started with a single argument, which is considered unusual and potentially malicious.
Detection queries are kept inside the platform. Get full rules →