Detection Of Tools Built By Nirsoft

Description

This search looks for specific command-line arguments that may indicate the execution of tools made by Nirsoft, which are legitimate, but may be abused by attackers.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Security Monitoring

Category

Malware,

Alert Volume

This search looks for specific command-line arguments that may indicate the execution of tools made by Nirsoft, which are legitimate, but may be abused by attackers.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Execution
Lateral Movement

MITRE ATT&CK Techniques

Software Deployment Tools

Software Deployment Tools

MITRE Threat Groups

APT32
Silence
Threat Group-1314

Kill Chain Phases

Installation
Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Detection Of Tools Built By Nirsoft Help

You must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model.

   Search

Open in Search