heroui logo

Memory Threat - Detected - Elastic Defend

Elastic Detection Rules

View Source
Summary
This detection rule is designed by Elastic to capture memory signature alerts generated by Elastic Defend, enhancing security across endpoints by allowing immediate investigation of potential memory-based malware attacks. It focuses on detecting in-memory threats that traditional disk-based security measures might miss. The rule operates by evaluating alerts that signal the presence of known malicious memory signatures or shellcode threads, which are techniques commonly employed by malware to evade detection by executing directly in system memory rather than relying on writing malicious code to disk. User-defined thresholds and specific queries enable the rule to operate, capturing relevant events from the Elastic endpoint alerts index. False positives (e.g., legitimate application behavior or benign code injections) may occur, therefore it includes a triage section to guide analysts in investigating these alerts effectively. Overall, this rule aligns with proactive threat detection principles and aims to mitigate high-risk threats through advanced investigation techniques and remediation steps.
Categories
  • Endpoint
  • macOS
  • Windows
  • Linux
Data Sources
  • Pod
  • Container
  • User Account
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1055
  • T1620
Created: 2024-03-24