
Summary
This detection rule aims to identify unusual parent or child processes related to the Windows Contacts application, specifically the ImagingDevices.exe process, which has been associated with the Bumblebee malware activity. The detection works by monitoring process creation events on Windows systems and analyzing the relationships between processes. If ImagingDevices.exe is observed to be spawned by certain known processes such as WmiPrvSE.exe, svchost.exe, or dllhost.exe, or if it spawns any child processes, this may indicate suspicious behavior linked to potential attacks. This rule is designed to provide a high level of threat detection, indicating that the relationship between these processes may be an indication of evasion or execution tactics employed by adversaries. The author of this rule highlights its relevance and significance in monitoring for sophisticated attacks on Windows systems, especially in scenarios involving malware or exploitation of built-in functionalities.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-09-27