heroui logo

Windows Local LLM Framework Execution

Splunk Security Content

View Source
Summary
This detection rule is designed to identify the execution of unauthorized local large language model (LLM) frameworks and Python-based AI/ML libraries running on Windows endpoints. The rule is crucial for monitoring potential shadow AI deployments and unauthorized operations that may involve model inference and data exfiltration. The analytics utilize process creation events from security logs, specifically looking for known executable names and associated command-line arguments. It allows security analysts to pinpoint instances where these frameworks are launched, highlighting significant threats to sensitive data or governance policies within an organization. If discovered, such activities might indicate malicious intent, necessitating further investigation.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1543
Created: 2025-11-20