heroui logo

Dxcap Proxy Execution

Anvilogic Forge

View Source
Summary
The detection rule titled 'Dxcap Proxy Execution' identifies instances of the usage of DXCap.exe, a legitimate command-line tool designed for capturing and playing back graphics diagnostics. This tool operates across various versions of Direct3D, specifically from version 10 to 12. In the context of security, the rule seeks to highlight potentially malicious behavior by monitoring for the execution of processes that function as subprocesses of DXCap.exe. This behavior aligns with common techniques used to evade detection by utilizing well-known binaries for executing unintended or malicious actions within a system, a tactic categorized under the defense evasion technique 'system binary proxy execution' (T1218). The logic for detecting these interactions is formulated using a Splunk-based query that filters Windows event logs for specific event IDs associated with process creation (EventCode 4688), and subsequently analyzes the relation between the parent process and the observed process activity related to DXCap.exe.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1218
Created: 2025-05-31