// soc investigation 2026-04-25
SOC118 Internal Port Scan Activity EventID 51
letsdefend Medium closed ✓ true positive
port-scan mitre/T1046 mitre/T1036
analyst verdict TRUE POSITIVE

🎯 MITRE ATT&CK

T1046 Network Service Discovery
T1036 Masquerading

🔎 What

The alert SOC118 Internal Port Scan Activity triggered after execution of empty.exe on host Katie. Analysis of the file hash confirms it is Zenmap, a graphical interface for Nmap. The binary was renamed to empty.exe and executed from C colon slash Program Files x86 slash Nmap, indicating possible obfuscation. Logs show the process initiated a port scan against internal host 172 dot 16 dot 17 dot 45 targeting ports 21 22 443 and 445 before being blocked.

🕐 When

Feb 06 2021 03:40 PM

📍 Where

Host Katie 172 dot 16 dot 17 dot 35 executed empty.exe and scanned internal host 172 dot 16 dot 17 dot 45

💡 Why

The alert was triggered due to detection of internal port scanning activity. Although Zenmap is a legitimate tool, its renamed execution and use to scan internal infrastructure indicates suspicious behavior consistent with reconnaissance. The scan was blocked by security controls and no further activity was observed. The activity is classified as a true positive reconnaissance attempt with no further containment required

🔬 Analysis Reports 🦠 VirusTotal → https://www.virustotal.com/gui/file/eb0254bcd34a9db914edd063b89f02d5e8a646ac35339f92216a0a34aa923174