
Summary
The rule detects potentially suspicious child processes that are spawned by the KeyScrambler.exe process on Windows systems. KeyScrambler is a known application used for keystroke encryption to enhance security against keyloggers and other malicious software that can intercept keystrokes. However, adversaries might misuse this software by spawning processes that could be used to execute malicious commands or evade detection from antivirus or endpoint detection solutions. The rule primarily focuses on child processes that originate from KeyScrambler.exe, indicating they could be execution attempts of potentially harmful scripts or utilities. The detection mechanism looks for specific parent-child process relationships, where the parent is KeyScrambler.exe, and the child is a set of recognized executable files that may be used in malicious contexts, including script engines and command-line interpreters. By monitoring these relationships, the rule aims to alert security analysts about possible execution of suspicious actions potentially related to attacks such as privilege escalation and evasion tactics.
Categories
- Windows
Data Sources
- Process
Created: 2024-05-13