
Summary
This detection rule from Elastic Endgame focuses on identifying process injection attempts, a technique frequently used by attackers to execute malicious code within the memory space of another process, thus evading many traditional security measures. The rule operates by monitoring specific events categorized as alerts in the Endgame module, particularly those related to kernel shellcode events. The rule has a high-risk score of 73, indicating a significant threat level. The setup requires configuration adjustments to ensure the rule can generate alerts above the default threshold, which is critical given the dynamic nature of threats. Analysts are encouraged to investigate alerts promptly, focusing on the context of each event and assessing any further suspicious activities that may be occurring in conjunction with the identified event. The rule leverages the MITRE ATT&CK framework for better alignment with known attack vectors, specifically targeting techniques related to privilege escalation, thus aiding in the detection of malicious activities that compromise system integrity. Suggested actions for response and remediation are outlined, including isolating affected systems and conducting thorough scans to identify and remove threats. Furthermore, guidance on managing possible false positives is provided, emphasizing the need for comprehensive assessments in real-time detection environments.
Categories
- Endpoint
- Cloud
- Windows
- Linux
Data Sources
- Process
- Sensor Health
- Application Log
- Network Traffic
- Command
ATT&CK Techniques
- T1055
Created: 2020-02-18