heroui logo

Csc.EXE Execution Form Potentially Suspicious Parent

Sigma Rules

View Source
Summary
This detection rule identifies potentially suspicious usage of "csc.exe" (the C# compiler) by analyzing its parent process. The execution of csc.exe is typically benign but can be exploited by attackers for malicious purposes, such as executing payloads through scripting or process hollowing. The rule checks the parent process image names and command lines to detect unusual execution patterns, which could indicate malicious activity. It utilizes multiple selection criteria to pinpoint suspicious parent processes, including common scripting engines like powershell.exe and various Microsoft Office applications, as well as locations that are typically abused for storage of malicious files. The rule is designed to minimize false positives by filtering legitimate programs and well-known processes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2019-02-11