
Summary
This detection rule identifies anomalies related to the spawning of `svchost.exe` processes in Windows environments. Typically, `svchost.exe` is a core system process that runs under the supervision of `services.exe`, which is responsible for launching and managing Windows services. The rule flags cases where `svchost.exe` is initiated by a parent process that differs from `services.exe`, which could signify potential malicious activity—such as exploit attempts or unauthorized scripts seeking to impersonate standard system behavior. The detection utilizes Windows event logs, specifically focusing on Sysmon Event ID 1 and Windows Event Log Security ID 4688, to capture the necessary process lineage and behavior. The outputs include key attributes such as parent process name and path, allowing for detailed investigation into unusual activity patterns that deviate from expected norms. Analysts should be mindful of valid exceptions, such as legitimate Windows Update processes, which might trigger false positives and require careful context consideration.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1036
- T1036.009
- T1035.009
Created: 2025-02-11