heroui logo

Suspicious Child Process Of Veeam Dabatase

Sigma Rules

View Source
Summary
This detection rule identifies suspicious child processes spawned from the Veeam service process, specifically when the parent process is `sqlservr.exe` and the command line includes `VEEAMSQL`. The rule flags potentially malicious activities that could lead to Remote Code Execution (RCE) or SQL Injection attacks. The detection logic examines the parent process and its command line arguments. If a process like `cmd.exe`, `powershell.exe`, or various other utilities is launched as a child, particularly with command lines that suggest suspicious behavior (e.g., network activity or script execution), it raises an alert. The intent is to monitor for unusual process creation patterns that may be indicative of exploitation of the Veeam environment. Analysts should investigate alerts to determine if a legitimate business process was misidentified or if malicious activity is occurring.
Categories
  • Windows
Data Sources
  • Process
Created: 2023-05-04