
Summary
The rule titled 'Suspicious .NET Code Compilation' detects the execution of .NET compilers, specifically 'csc.exe' and 'vbc.exe', initiated by unusual parent processes on Windows systems. This behavior may indicate an attacker's attempt to compile code after delivery to bypass security mechanisms. The detection focuses on parent processes that are commonly associated with scripting (like wscript.exe and mshta.exe) and system utilities (like svchost.exe and rundll32.exe). The rule collects data from various sources including winlogbeat, endpoint events, and security logs, and relies on EQL (Event Query Language) for querying the process executions. It carries a medium risk score of 47 and is part of the MITRE ATT&CK framework, specifically addressing techniques for defense evasion and execution. The rule includes detailed guidance for investigation, false positive analysis, and remediation steps. Organizations are encouraged to adjust the rule to suit their operational needs, and it highlights the importance of correlating and validating detections with other security alerts to establish a comprehensive incident response strategy.
Categories
- Endpoint
- Windows
- Cloud
- Infrastructure
Data Sources
- Process
- Windows Registry
- Application Log
- Image
- Malware Repository
ATT&CK Techniques
- T1027
- T1027.004
- T1059
- T1059.005
Created: 2020-08-21