
Summary
The analytic rule 'Windows WinDBG Spawning AutoIt3' is designed to monitor Windows endpoint telemetry for cases where the WinDBG debugger process (windbg.exe) spawns the AutoIt scripting process (autoit3.exe or similar). This behavior is significant as AutoIt3 is commonly utilized by threat actors to automate malicious tasks, indicating potential nefarious activities. The detection leverages several data sources including Sysmon and Windows Security Event Logs to identify when windbg.exe is the parent process and autoit3.exe is the child. The rule uses a search query to analyze detected instances, filtering for specific file extensions that further indicate scripting activity associated with automated tasks. Overall, this rule aims to identify and alert on possible exploitation scenarios that could lead to data exfiltration or malware deployment.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1059
Created: 2024-12-10