
Summary
This rule detects suspicious behavior when a child process is spawned from Microsoft Outlook, specifically when the child process image is sourced from a remote location such as SMB or WebDav shares. This type of behavior often serves as an indicator of potential compromise or exploitation, particularly in cases where remote execution is leveraged by adversaries to evade traditional security measures. The rule checks whether the parent process is Outlook (verified through the ParentImage path) and whether the child process's image begins with a path indicating it is located on a remote share (verified through the Image path). By triggering on this combination of conditions, the detection aims to identify potential threats associated with malicious remote operations initiated from a commonly trusted application like Outlook.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Logon Session
Created: 2018-12-27