
Summary
This detection rule is developed by Elastic to identify a suspicious parent-child process relationship specifically targeting Windows environments. It focuses on instances where `cmd.exe` is spawned by `PowerShell.exe`, which is often indicative of potentially malicious activities since attackers frequently utilize PowerShell to orchestrate and launch shell commands covertly. The rule employs a KQL (Kibana Query Language) based query filtering events based on process category and type, extracting those particular instances where the parent process (PowerShell) and child process (Cmd) are involved. The low-risk score of 21 suggests that while the event may be suspicious, it is not necessarily malicious in every instance. However, the activity's association with known MITRE ATT&CK techniques points to its potential relevance in broader attack patterns. A deprecation notice indicates that users should consult updated or alternate versions of the rule for more current threat detection coverage.
Categories
- Windows
- Endpoint
- Infrastructure
- Application
- Identity Management
Data Sources
- Process
- Logon Session
- Windows Registry
ATT&CK Techniques
- T1059
- T1059.001
Created: 2020-02-18