Unusual Network Activity from Windows System Binaries
Detection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.
Attackers frequently abuse trusted Windows system binaries and developer utilities to proxy the execution of malicious payloads, effectively bypassing security controls that would otherwise prevent direct execution. This technique, known as “System Binary Proxy Execution,” allows adversaries to masquerade their activities and blend in with legitimate system processes. This detection identifies network activity from system applications such as mshta.exe, regsvr32.exe, and installutil.exe that are not expected to initiate network connections under normal circumstances. The original rule was created in September 2020, and updated in May 2026. The scope of targeting includes any Windows environment where adversaries might attempt to evade detection by proxying malicious activity through trusted system binaries.
Attack Chain
- An attacker gains initial access to the system, often through phishing or exploiting a vulnerability.
- The attacker drops a malicious payload onto the system, potentially obfuscated to avoid detection.
- The attacker uses a trusted system binary, such as
mshta.exe,regsvr32.exe, orinstallutil.exeto execute the payload. - The system binary initiates a network connection, potentially to a command-and-control (C2) server.
- The attacker uses the C2 channel to download additional tools or exfiltrate data.
- The attacker moves laterally within the network, compromising additional systems.
- The attacker achieves their final objective, such as data theft, ransomware deployment, or system disruption.
Impact
Successful exploitation can lead to a variety of negative impacts, including data breaches, system compromise, and potential financial losses. The technique is often employed in targeted attacks and can be difficult to detect due to the use of legitimate system binaries. If successful, attackers can maintain persistence, escalate privileges, and move laterally within the network, leading to widespread damage.
Recommendation
- Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to provide the necessary data for detection.
- Deploy the Sigma rules in this brief to your SIEM to detect unusual network activity from Windows system binaries.
- Regularly review and update the list of known benign network connections from these binaries to reduce false positives.
- Implement application control policies to restrict the execution of untrusted applications.
- Monitor DNS queries (Sysmon Event ID 22) for suspicious domain resolutions originating from system binaries.
Detection coverage 3
Detect Network Connection from Mshta.exe
mediumDetects network connections initiated by mshta.exe, potentially indicating malicious script execution.
Detect Network Connection from Regsvr32.exe
mediumDetects network connections initiated by regsvr32.exe, which can be used to download and execute malicious DLLs.
Detect Network Connection from InstallUtil.exe
mediumDetects network connections initiated by InstallUtil.exe, potentially indicating malicious .NET assembly execution.
Detection queries are kept inside the platform. Get full rules →