← Back to SOC feed Coverage →

Network Connection Initiated To AzureWebsites.NET By Non-Browser Process

sigma MEDIUM SigmaHQ
T1102T1102.001
imNetworkSession
backdoor
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-05-05T11:00:00Z · Confidence: medium

Hunt Hypothesis

Detects an initiated network connection by a non browser process on the system to “azurewebsites.net”. The latter was often used by threat actors as a malware hosting and exfiltration site.

Detection Rule

Sigma (Original)

title: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process
id: 5c80b618-0dbb-46e6-acbb-03d90bcb6d83
related:
    - id: e043f529-8514-4205-8ab0-7f7d2927b400
      type: derived
status: test
description: |
    Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.
references:
    - https://www.sentinelone.com/labs/wip26-espionage-threat-actors-abuse-cloud-infrastructure-in-targeted-telco-attacks/
    - https://symantec-enterprise-blogs.security.com/threat-intelligence/harvester-new-apt-attacks-asia
    - https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/higaisa-or-winnti-apt-41-backdoors-old-and-new/
    - https://intezer.com/blog/research/how-we-escaped-docker-in-azure-functions/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2024-06-24
modified: 2024-07-16
tags:
    - attack.command-and-control
    - attack.t1102
    - attack.t1102.001
logsource:
    category: network_connection
    product: windows
detection:
    selection:
        Initiated: 'true'
        DestinationHostname|endswith: 'azurewebsites.net'
    # Note: Add/Remove browsers/applications that you don't use or those that have custom install locations
    # Note: To avoid complex conditions the filters for some apps are generic by name only. A custom tuning is recommended for best results
    filter_main_chrome:
        Image:
            - 'C:\Program Files\Google\Chrome\Application\chrome.exe'
            - 'C:\Program Files (x86)\Google\Chrome\Application\chrome.exe'
    filter_main_chrome_appdata:
        Image|startswith: 'C:\Users\'
        Image|endswith: '\AppData\Local\Google\Chrome\Application\chrome.exe'
    filter_main_firefox:
        Image:
            - 'C:\Program Files\Mozilla Firefox\firefox.exe'
            - 'C:\Program Files (x86)\Mozilla Firefox\firefox.exe'
    filter_main_firefox_appdata:
        Image|startswith: 'C:\Users\'
        Image|endswith: '\AppData\Local\Mozilla Firefox\firefox.exe'
    filter_main_ie:
        Image:
            - 'C:\Program Files (x86)\Internet Explorer\iexplore.exe'
            - 'C:\Program Files\Internet Explorer\iexplore.exe'
    filter_main_edge_1:
        - Image|startswith: 'C:\Program Files (x86)\Microsoft\EdgeWebView\Application\'
        - Image|endswith: '\WindowsApps\MicrosoftEdge.exe'
        - Image:
              - 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe'
              - 'C:\Program Files\Microsoft\Edge\Application\msedge.exe'
    filter_main_edge_2:
        Image|startswith:
            - 'C:\Program Files (x86)\Microsoft\EdgeCore\'
            - 'C:\Program Files\Microsoft\EdgeCore\'
        Image|endswith:
            - '\msedge.exe'
            - '\msedgewebview2.exe'
    filter_main_safari:
        Image|contains:
            - 'C:\Program Files (x86)\Safari\'
            - 'C:\Program Files\Safari\'
        Image|endswith: '\safari.exe'
    filter_main_defender:
        Image|contains:
            - 'C:\Program Files\Windows Defender Advanced Threat Protection\'
            - 'C:\Program Files\Windows Defender\'
            - 'C:\ProgramData\Microsoft\Windows Defender\Platform\'
        Image|endswith:
            - '\MsMpEng.exe' # Microsoft Defender executable
            - '\MsSense.exe' # Windows Defender Advanced Threat Protection Service Executable
    filter_main_prtg:
        # Paessler's PRTG Network Monitor
        Image|endswith:
            - 'C:\Program Files (x86)\PRTG Network Monitor\PRTG Probe.exe'
            - 'C:\Program Files\PRTG Network Monitor\PRTG Probe.exe'
    filter_main_brave:
        Image|startswith: 'C:\Program Files\BraveSoftware\'
        Image|endswith: '\brave.exe'
    filter_main_maxthon:
        Image|contains: '\AppData\Local\Maxthon\'
        Image|endswith: '\maxthon.exe'
    filter_main_opera:
        Image|contains: '\AppData\Local\Programs\Opera\'
        Image|endswith: '\opera.exe'
    filter_main_seamonkey:
        Image|startswith:
            - 'C:\Program Files\SeaMonkey\'
            - 'C:\Program Files (x86)\SeaMonkey\'
        Image|endswith: '\seamonkey.exe'
    filter_main_vivaldi:
        Image|contains: '\AppData\Local\Vivaldi\'
        Image|endswith: '\vivaldi.exe'
    filter_main_whale:
        Image|startswith:
            - 'C:\Program Files\Naver\Naver Whale\'
            - 'C:\Program Files (x86)\Naver\Naver Whale\'
        Image|endswith: '\whale.exe'
    # Note: The TOR browser shouldn't be something you allow in your corporate network.
    # filter_main_tor:
    #     Image|contains: '\Tor Browser\'
    filter_main_whaterfox:
        Image|startswith:
            - 'C:\Program Files\Waterfox\'
            - 'C:\Program Files (x86)\Waterfox\'
        Image|endswith: '\Waterfox.exe'
    filter_main_slimbrowser:
        Image|startswith:
            - 'C:\Program Files\SlimBrowser\'
            - 'C:\Program Files (x86)\SlimBrowser\'
        Image|endswith: '\slimbrowser.exe'
    filter_main_flock:
        Image|contains: '\AppData\Local\Flock\'
        Image|endswith: '\Flock.exe'
    filter_main_phoebe:
        Image|contains: '\AppData\Local\Phoebe\'
        Image|endswith: '\Phoebe.exe'
    filter_main_falkon:
        Image|startswith:
            - 'C:\Program Files\Falkon\'
            - 'C:\Program Files (x86)\Falkon\'
        Image|endswith: '\falkon.exe'
    filter_main_qtweb:
        Image|startswith:
            - 'C:\Program Files (x86)\QtWeb\'
            - 'C:\Program Files\QtWeb\'
        Image|endswith: '\QtWeb.exe'
    filter_main_avant:
        Image|startswith:
            - 'C:\Program Files (x86)\Avant Browser\'
            - 'C:\Program Files\Avant Browser\'
        Image|endswith: '\avant.exe'
    filter_main_discord:
        Image|contains: '\AppData\Local\Discord\'
        Image|endswith: '\Discord.exe'
    filter_main_null:
        Image: null
    filter_main_empty:
        Image: ''
    # filter_optional_qlik:
    #     Image|endswith: '\Engine.exe' # Process from qlik.com app
    condition: selection and not 1 of filter_main_*
falsepositives:
    - Unknown
level: medium

KQL (Azure Sentinel)

imNetworkSession
| where (NetworkDirection =~ "true" and DstHostname endswith "azurewebsites.net") and (not((((SrcProcessName in~ ("C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe", "C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe")) or (DstProcessName in~ ("C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe", "C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe"))) or ((SrcProcessName startswith "C:\\Users\\" or DstProcessName startswith "C:\\Users\\") and (SrcProcessName endswith "\\AppData\\Local\\Google\\Chrome\\Application\\chrome.exe" or DstProcessName endswith "\\AppData\\Local\\Google\\Chrome\\Application\\chrome.exe")) or ((SrcProcessName in~ ("C:\\Program Files\\Mozilla Firefox\\firefox.exe", "C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe")) or (DstProcessName in~ ("C:\\Program Files\\Mozilla Firefox\\firefox.exe", "C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe"))) or ((SrcProcessName startswith "C:\\Users\\" or DstProcessName startswith "C:\\Users\\") and (SrcProcessName endswith "\\AppData\\Local\\Mozilla Firefox\\firefox.exe" or DstProcessName endswith "\\AppData\\Local\\Mozilla Firefox\\firefox.exe")) or ((SrcProcessName in~ ("C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe", "C:\\Program Files\\Internet Explorer\\iexplore.exe")) or (DstProcessName in~ ("C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe", "C:\\Program Files\\Internet Explorer\\iexplore.exe"))) or ((SrcProcessName startswith "C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\" or DstProcessName startswith "C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\") or (SrcProcessName endswith "\\WindowsApps\\MicrosoftEdge.exe" or DstProcessName endswith "\\WindowsApps\\MicrosoftEdge.exe") or ((SrcProcessName in~ ("C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe", "C:\\Program Files\\Microsoft\\Edge\\Application\\msedge.exe")) or (DstProcessName in~ ("C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe", "C:\\Program Files\\Microsoft\\Edge\\Application\\msedge.exe")))) or (((SrcProcessName startswith "C:\\Program Files (x86)\\Microsoft\\EdgeCore\\" or SrcProcessName startswith "C:\\Program Files\\Microsoft\\EdgeCore\\") or (DstProcessName startswith "C:\\Program Files (x86)\\Microsoft\\EdgeCore\\" or DstProcessName startswith "C:\\Program Files\\Microsoft\\EdgeCore\\")) and ((SrcProcessName endswith "\\msedge.exe" or SrcProcessName endswith "\\msedgewebview2.exe") or (DstProcessName endswith "\\msedge.exe" or DstProcessName endswith "\\msedgewebview2.exe"))) or (((SrcProcessName contains "C:\\Program Files (x86)\\Safari\\" or SrcProcessName contains "C:\\Program Files\\Safari\\") or (DstProcessName contains "C:\\Program Files (x86)\\Safari\\" or DstProcessName contains "C:\\Program Files\\Safari\\")) and (SrcProcessName endswith "\\safari.exe" or DstProcessName endswith "\\safari.exe")) or (((SrcProcessName contains "C:\\Program Files\\Windows Defender Advanced Threat Protection\\" or SrcProcessName contains "C:\\Program Files\\Windows Defender\\" or SrcProcessName contains "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\") or (DstProcessName contains "C:\\Program Files\\Windows Defender Advanced Threat Protection\\" or DstProcessName contains "C:\\Program Files\\Windows Defender\\" or DstProcessName contains "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\")) and ((SrcProcessName endswith "\\MsMpEng.exe" or SrcProcessName endswith "\\MsSense.exe") or (DstProcessName endswith "\\MsMpEng.exe" or DstProcessName endswith "\\MsSense.exe"))) or ((SrcProcessName endswith "C:\\Program Files (x86)\\PRTG Network Monitor\\PRTG Probe.exe" or SrcProcessName endswith "C:\\Program Files\\PRTG Network Monitor\\PRTG Probe.exe") or (DstProcessName endswith "C:\\Program Files (x86)\\PRTG Network Monitor\\PRTG Probe.exe" or DstProcessName endswith "C:\\Program Files\\PRTG Network Monitor\\PRTG Probe.exe")) or ((SrcProcessName startswith "C:\\Program Files\\BraveSoftware\\" or DstProcessName startswith "C:\\Program Files\\BraveSoftware\\") and (SrcProcessName endswith "\\brave.exe" or DstProcessName endswith "\\brave.exe")) or ((SrcProcessName contains "\\AppData\\Local\\Maxthon\\" or DstProcessName contains "\\AppData\\Local\\Maxthon\\") and (SrcProcessName endswith "\\maxthon.exe" or DstProcessName endswith "\\maxthon.exe")) or ((SrcProcessName contains "\\AppData\\Local\\Programs\\Opera\\" or DstProcessName contains "\\AppData\\Local\\Programs\\Opera\\") and (SrcProcessName endswith "\\opera.exe" or DstProcessName endswith "\\opera.exe")) or (((SrcProcessName startswith "C:\\Program Files\\SeaMonkey\\" or SrcProcessName startswith "C:\\Program Files (x86)\\SeaMonkey\\") or (DstProcessName startswith "C:\\Program Files\\SeaMonkey\\" or DstProcessName startswith "C:\\Program Files (x86)\\SeaMonkey\\")) and (SrcProcessName endswith "\\seamonkey.exe" or DstProcessName endswith "\\seamonkey.exe")) or ((SrcProcessName contains "\\AppData\\Local\\Vivaldi\\" or DstProcessName contains "\\AppData\\Local\\Vivaldi\\") and (SrcProcessName endswith "\\vivaldi.exe" or DstProcessName endswith "\\vivaldi.exe")) or (((SrcProcessName startswith "C:\\Program Files\\Naver\\Naver Whale\\" or SrcProcessName startswith "C:\\Program Files (x86)\\Naver\\Naver Whale\\") or (DstProcessName startswith "C:\\Program Files\\Naver\\Naver Whale\\" or DstProcessName startswith "C:\\Program Files (x86)\\Naver\\Naver Whale\\")) and (SrcProcessName endswith "\\whale.exe" or DstProcessName endswith "\\whale.exe")) or (((SrcProcessName startswith "C:\\Program Files\\Waterfox\\" or SrcProcessName startswith "C:\\Program Files (x86)\\Waterfox\\") or (DstProcessName startswith "C:\\Program Files\\Waterfox\\" or DstProcessName startswith "C:\\Program Files (x86)\\Waterfox\\")) and (SrcProcessName endswith "\\Waterfox.exe" or DstProcessName endswith "\\Waterfox.exe")) or (((SrcProcessName startswith "C:\\Program Files\\SlimBrowser\\" or SrcProcessName startswith "C:\\Program Files (x86)\\SlimBrowser\\") or (DstProcessName startswith "C:\\Program Files\\SlimBrowser\\" or DstProcessName startswith "C:\\Program Files (x86)\\SlimBrowser\\")) and (SrcProcessName endswith "\\slimbrowser.exe" or DstProcessName endswith "\\slimbrowser.exe")) or ((SrcProcessName contains "\\AppData\\Local\\Flock\\" or DstProcessName contains "\\AppData\\Local\\Flock\\") and (SrcProcessName endswith "\\Flock.exe" or DstProcessName endswith "\\Flock.exe")) or ((SrcProcessName contains "\\AppData\\Local\\Phoebe\\" or DstProcessName contains "\\AppData\\Local\\Phoebe\\") and (SrcProcessName endswith "\\Phoebe.exe" or DstProcessName endswith "\\Phoebe.exe")) or (((SrcProcessName startswith "C:\\Program Files\\Falkon\\" or SrcProcessName startswith "C:\\Program Files (x86)\\Falkon\\") or (DstProcessName startswith "C:\\Program Files\\Falkon\\" or DstProcessName startswith "C:\\Program Files (x86)\\Falkon\\")) and (SrcProcessName endswith "\\falkon.exe" or DstProcessName endswith "\\falkon.exe")) or (((SrcProcessName startswith "C:\\Program Files (x86)\\QtWeb\\" or SrcProcessName startswith "C:\\Program Files\\QtWeb\\") or (DstProcessName startswith "C:\\Program Files (x86)\\QtWeb\\" or DstProcessName startswith "C:\\Program Files\\QtWeb\\")) and (SrcProcessName endswith "\\QtWeb.exe" or DstProcessName endswith "\\QtWeb.exe")) or (((SrcProcessName startswith "C:\\Program Files (x86)\\Avant Browser\\" or SrcProcessName startswith "C:\\Program Files\\Avant Browser\\") or (DstProcessName startswith "C:\\Program Files (x86)\\Avant Browser\\" or DstProcessName startswith "C:\\Program Files\\Avant Browser\\")) and (SrcProcessName endswith "\\avant.exe" or DstProcessName endswith "\\avant.exe")) or ((SrcProcessName contains "\\AppData\\Local\\Discord\\" or DstProcessName contains "\\AppData\\Local\\Discord\\") and (SrcProcessName endswith "\\Discord.exe" or DstProcessName endswith "\\Discord.exe")) or (isnull(SrcProcessName) or isnull(DstProcessName)) or (SrcProcessName =~ "" or DstProcessName =~ ""))))

Required Data Sources

Sentinel TableNotes
imNetworkSessionEnsure this data connector is enabled

False Positive Guidance

MITRE ATT&CK Context

References

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/network_connection/net_connection_win_domain_azurewebsites.yml