T1048.001

Exfiltration Over Symmetric Encrypted Non-C2 Protocol

Adversaries may steal data by exfiltrating it over a symmetrically encrypted network protocol other than that of the existing command and control channel. Symmetric encryption algorithms (RC4, AES, ChaCha20, Blowfish) use shared keys on both ends of the channel. Attackers may implement custom encryption over protocols not natively encrypted (HTTP, FTP, DNS) or add extra encryption layers over already-encrypted protocols (HTTPS, SFTP) to obscure data contents from network inspection tools. This technique is distinguished from asymmetric exfiltration by the pre-shared key requirement, often resulting in artifacts such as key material embedded in scripts, configuration files, or command-line arguments.

Microsoft Sentinel / Defender
kusto
let SuspiciousExfilTools = dynamic(["openssl", "ccrypt", "mcrypt", "gpg", "7z", "aescrypt", "cryptcat"]);
let SuspiciousExfilArgs = dynamic(["enc -aes", "enc -rc4", "enc -des", "-k ", "-pass pass:", "-aes-256", "-aes-128", "aes256", "rc4", "chacha20", "-nosalt", "-base64"]);
let NetworkExfilPorts = dynamic([21, 22, 25, 80, 443, 8080, 8443, 4444, 1337, 9001, 6666, 53]);
// Detection 1: Processes using encryption tools with network-related arguments
let EncryptionToolUsage = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName has_any (SuspiciousExfilTools)
  or (FileName =~ "python.exe" and ProcessCommandLine has_any ("AES", "RC4", "Cipher", "encrypt", "socket", "send"))
  or (FileName =~ "python3" and ProcessCommandLine has_any ("AES", "RC4", "Cipher", "encrypt", "socket", "send"))
| where ProcessCommandLine has_any (SuspiciousExfilArgs)
| extend EncryptionAlgo = case(
    ProcessCommandLine has "aes", "AES",
    ProcessCommandLine has "rc4", "RC4",
    ProcessCommandLine has "des", "DES",
    ProcessCommandLine has "chacha", "ChaCha20",
    ProcessCommandLine has "blowfish", "Blowfish",
    "Unknown"
  )
| extend HasNetworkIndicator = ProcessCommandLine has_any ("-connect", "-l ", "nc ", "netcat", "curl", "wget", "ftp", "http", "tcp", "udp", "socket")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine, EncryptionAlgo, HasNetworkIndicator;
// Detection 2: Large outbound network connections from encryption-capable processes
let EncryptedNetworkExfil = DeviceNetworkEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName has_any (SuspiciousExfilTools)
  or InitiatingProcessFileName in~ ("openssl", "ccrypt", "cryptcat")
| where RemoteIPType == "Public"
| where SentBytes > 1000000
| extend ExfilSizeMB = round(toreal(SentBytes) / 1048576, 2)
| project Timestamp, DeviceName, AccountName, RemoteIP, RemotePort, RemoteUrl, SentBytes, ExfilSizeMB, InitiatingProcessFileName, InitiatingProcessCommandLine;
// Detection 3: OpenSSL or cryptcat creating network connections
let OpenSSLNetworkActivity = DeviceNetworkEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName =~ "openssl" or InitiatingProcessCommandLine has "openssl"
| where RemoteIPType == "Public"
| project Timestamp, DeviceName, AccountName, RemoteIP, RemotePort, SentBytes, ReceivedBytes, InitiatingProcessFileName, InitiatingProcessCommandLine;
union EncryptionToolUsage, EncryptedNetworkExfil, OpenSSLNetworkActivity
| sort by Timestamp desc
high severity medium confidence

Data Sources

Process: Process Creation Network Traffic: Network Connection Creation Network Traffic: Network Traffic Flow Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents DeviceNetworkEvents

False Positives

  • Legitimate use of OpenSSL for TLS certificate management, key generation, or PKI operations by system administrators
  • Backup software using AES encryption to transfer data to cloud storage (e.g., Veeam, Acronis, rsync with encryption flags)
  • Secure file transfer tools such as SFTP, SCP, or WinSCP that use symmetric encryption internally during session
  • Security scanning and penetration testing tools (Metasploit, nmap scripts) run by authorized red team or security operations personnel
  • Software build pipelines encrypting artifacts for distribution using OpenSSL or GPG with symmetric keys

Unlock Pro Content

Get the full detection package for T1048.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections