Score:0

How to identify application that is generating ICMP echo requests on Windows 10?

ar flag

My company security team has informed me that my workstation is pinging some "blacklisted" IP addresses. The enterprise security tool reporting this information sits in place of the usual Windows firewall, but it seems it is unable to tell which process is the culprit.

I had the device rebuilt about six months ago for the same reason, and I'm pretty sure it's just an application that's using a content-delivery network that happens to have also been used by some malware at some point; hence the blocklisted IPs.

Normally in this situation a combination of Wireshark, netstat, TCPView and other tools would help me nail down which process is generating the traffic. For ICMP echo requests, however, it seems that the source process is always a system DLL.

Some googling led to a page which does have some advice on how to narrow down the process by checking which have got the icmp.dll or iphlpapi.dll loaded. I've currently got dozens of processes with iphlpapi.dll loaded, so trying to narrow down which might be sending these requests is going to take quite some time.

Another issue is that these ICMP requests are sent very infrequently. Maybe a couple of times a day. So at the point I'm looking, the process might not even be running.

What I really need is a tool that I can leave running which will look for ICMP requests to these IP addresses, and as soon as they're seen it will identify the process that made them. Does such a thing exist? Is there another low-effort approach that I'm missing?

cn flag
What tools does the security team have on the endpoint?
Gordon Mckeown avatar
ar flag
Many, many tools! For security reasons I won't list them all, but I think the one that's relevant here (i.e. the one that's flagging an issue) is CrowdStrike Falcon.
cn flag
For a one-time capture, Sysmon Network Connections may show this, along with Process Creation. https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
Gordon Mckeown avatar
ar flag
I can't see anything in SysMon that might help specifically with ICMP traffic, but the process creation you mention might help correlate with the Wireshark log. I shall give it a try, thanks.
cn flag
This type of activity is fairly easy to correlate in Sysmon. The challenge may be the infrequency. If Sysmon doesn't work, other options I can think of is forcing a crash or memory snapshot when the activity occurs, or use a more capable tool like Time Travel Debugger. https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/time-travel-debugging-overview#ttd-availability
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.