
Summary
This detection rule identifies instances of the `searchindexer.exe` process that are initiated by processes other than `services.exe`, which could indicate a process injection attempt. This behavior is particularly noteworthy because malware such as QakBot is known to exploit this executable to obfuscate its malicious actions, including data exfiltration and keystroke logging, while bypassing traditional detection mechanisms. The detection leverages data from Endpoint Detection and Response (EDR) systems to monitor process creation and parent-child relationships, thereby detecting anomalies in process spawning patterns. Upon detection, it is crucial to analyze the involved endpoints for potential compromises or active threats, ensuring comprehensive incident response measures are taken to mitigate risks associated with unauthorized process injections.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Process
ATT&CK Techniques
- T1055
Created: 2024-11-13