
Summary
The detection rule titled 'Windows Parent PID Spoofing with Explorer' identifies potential malicious behavior involving the 'explorer.exe' process utilizing the '/root' command-line parameter. This analysis highlights a significant security risk, as the '/root' parameter within 'explorer.exe' suggests possible parent process spoofing, a technique that malware may use to disguise its actions and evade detection mechanisms. The detection relies on telemetry from Endpoint Detection and Response (EDR) systems and focuses on process and command-line data to uncover suspicious activities. Malicious instances of this behavior could lead to unauthorized access or privilege escalation, creating persistent threats in the computer environment. The rule utilizes multiple data sources, including Sysmon and Windows Event Logs, to draw upon comprehensive and accurate information to effectively identify such questionable processes. The rule's implementation requires the appropriate ingestion of logs paired with the Splunk CIM for normalization to ensure efficiency and precision during the analytical process.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
ATT&CK Techniques
- T1134.004
- T1134
Created: 2024-12-10