heroui logo

Process Execution from an Unusual Directory

Elastic Detection Rules

View Source
Summary
This detection rule is aimed at identifying the execution of processes from suspicious default Windows directories, a technique often exploited by adversaries to conceal malware in trusted paths on the system. The rule leverages EQL (Event Query Language) to filter for process executions that match specific suspicious executable paths typically associated with benign Windows operations but may also be targeted for malicious purposes. Upon triggering, it requires inquiry into the parent-child process hierarchy, checking associated activities for abnormal behavior such as unauthorized network connections or modifications to system files. It underscores the importance of investigating executable signatures and parent processes to discern potential threats buried within familiar system directories. The provided query enables maturing detection capabilities to analyze such incidents, underpinning both proactive threat hunting and reactive incident response scenarios.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1036
  • T1036.005
Created: 2020-10-30