
Summary
The 'Rare Process Execution' detection rule is designed to identify anomalies in process execution on Windows endpoints. It leverages Sysmon event data, particularly focusing on Event Code 1, which logs process creation events. The logic filters out common benign process executions, specifically those that originate from the standard program files and Windows directories known for typical operational activities. By isolating processes that do not conform to these paths, the rule effectively highlights rare process executions that could be indicative of malicious behavior, such as unauthorized scripts or malware execution attempts.
The detection captures various specifics of the process, including path, parent process, and hosts involved, to construct a clearer picture of potential threats. Annotations from threat actor intelligence, such as associations with groups like Traveling Spider and Wizard Spider, along with software links to malware like Conti and Ryuk, provide context for the threat landscape this rule addresses. The rule can be prone to false positives; however, its function as a supplementary detection mechanism could help identify malware that conventional signatures might miss.
Categories
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1204.002
- T1059.003
Created: 2024-02-09