
Summary
This detection rule identifies suspicious child processes (Cmd.exe and Powershell.exe) that are initiated by specific SolarWinds parent processes, indicative of potential misuse or compromise. It's crucial to monitor for unauthorized command execution via SolarWinds, a widely utilized IT management tool, which can be exploited by threat actors to carry out malicious activities. This rule leverages EQL to query processes on Windows operating systems for those related to known SolarWinds executables that may lead to unauthorized command execution. The rule is designed to ensure early detection of behaviors aligned with recognized attack vectors outlined in the MITRE ATT&CK framework, specifically focusing on execution tactics and supply chain compromise.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1059
- T1059.001
- T1059.003
- T1195
- T1195.002
Created: 2020-12-14