Hello Team,
Recently we have integrated Checkpoint Firewall with our Qradar SIEM for SOC Monitoring Prospective. So during our SIEM Monitoring we noticed that we are getting events related to DNS queries made to Malicious Domains to our DNS server, but we are not able to track the origin of this request from which machine the DNS queries are made below is the sample Payload for your reference:
src/scope ip = 172.18.134.166 (DNS Server)
origin = 172.18.135.128 (Firewall IP)
LEEF:2.0|Check Point|New Anti Virus|1.0|Prevent|devTime=1752364685 srcPort=51511 srcBytes=75096 dstBytes=69916 url=dwell-exclaim.biz dwell-exclaim.biz dwell-exclaim.biz dwell-exclaim.biz dwell-exclaim.biz signature=Generic.TC.893cvpFR malware=Generic policyName=MB-PERIMETER cat=New Anti Virus sev=5 action=Prevent ifdir=outbound ifname=eth1 loguid={0x220fc418,0x8fd522ad,0xcaa1cce8,0xc9cc5a22} origin=172.18.135.128 originsicname=CN\=MB-PERIMETER-FW-2,O\=MIN-Test-MGMT..x2yup5 sequencenum=5 version=5 confidence_level=5 description=DNS response was replaced with a DNS trap bogus IP. See sk74060 for more information. dns_message_type=Query dst=37.209.192.13 lastupdatetime=1752366010 log_id=2 malware_action=DNS query for a site known to contain malware malware_rule_id={C3D9A814-BCC8-994D-8E3B-0C0A48C7A0F8} policy_time=1752262987 protection_id=00453B448 protection_type=DNS reputation proto=17 question_rdata=A:www.dwell-exclaim.biz scope=172.18.134.166 service=53 session_id={0x6872f68d,0x22,0x7290a0f1,0xe06837e8} smartdefense_profile=Recommended_Profile src=172.18.134.166 suppressed_logs=278 tid=8142 layer_name=PM-PERIMETER Threat Prevention layer_name=PB-PERIMETER Threat Prevention layer_name=PB-PERIMETER Threat Prevention layer_name=PB-PERIMETER Threat Prevention layer_name=PB-PERIMETER Threat Prevention layer_uuid={CA414E04-5736-194B-8979-10D42CF1A923} layer_uuid={CA414E04-5736-194B-8979-10D42CF1A923} layer_uuid={CA414E04-5736-194B-8979-10D42CF1A923} layer_uuid={CA414E04-5736-194B-8979-10D42CF1A923} layer_uuid={CA414E04-5736-194B-8979-10D42CF1A923} malware_rule_id={C3D9A814-BCC8-994D-8E3B-0C0A48C7A0F8} malware_rule_id={C3D9A814-BCC8-994D-8E3B-0C0A48C7A0F8} malware_rule_id={C3D9A814-BCC8-994D-8E3B-0C0A48C7A0F8} malware_rule_id={C3D9A814-BCC8-994D-8E3B-0C0A48C7A0F8} malware_rule_id={C3D9A814-BCC8-994D-8E3B-0C0A48C7A0F8} smartdefense_profile=Recommended_Profile smartdefense_profile=Recommended_Profile smartdefense_profile=Recommended_Profile smartdefense_profile=Recommended_Profile smartdefense_profile=Recommended_Profile vendor_list=Check Point ThreatCloud