heroui logo

Windows Browser Process Launched with Unusual Flags

Splunk Security Content

View Source
Summary
This detection rule is designed to identify anomalous behavior in Windows browser processes that are started with unusual command-line flags, specifically `--mute-audio` and `--do-not-elevate`. These flags, which deviate from typical browser launch parameters, may indicate the presence of automated scripts, testing contexts, or malicious attempts to alter browser behavior for silent operation or restriction of privilege escalation. The rule uses Sysmon EventID 1 to monitor these flags, aiming to capture instances where non-standard launch parameters are employed for browsers like Chrome, Edge, Brave, and Firefox. By analyzing the process's parent name and path, as well as its command-line arguments, security analysts can distinguish between legitimate administrative actions or testing scenarios and potentially malicious activities or configuration errors. This anomaly detection is crucial for maintaining compliance and identifying security threats effectively.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1185
Created: 2025-10-31