
Summary
This rule detects instances where the Microsoft Build Engine (MSBuild), typically used for building applications, has initiated unusual processes such as PowerShell scripts or the Visual C# Command Line Compiler. Adversaries may exploit MSBuild to execute malicious scripts, which can bypass conventional security measures. The rule is particularly valuable for identifying suspicious activity in Windows environments, as it flags abnormal behavior associated with MSBuild, signaling a possible misuse for executing unauthorized or harmful actions. The detection query looks for events where MSBuild is the parent process and flags child processes that are not typically associated with normal MSBuild operations. The rule's low severity indicates it is a precautionary measure, recommending investigation particularly where the triggering processes are uncommon for the user or system in question.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1027
- T1027.004
- T1127
- T1127.001
Created: 2020-03-25