heroui logo

Unusual Discovery Signal Alert with Unusual Process Executable

Elastic Detection Rules

View Source
Summary
This rule is designed to detect potentially malicious discovery activities in Windows environments by flagging signals that exhibit uncommon combinations of unique host IDs, user IDs, and process executables. By utilizing the Discovery building block rule alert data, it specifically targets unusual entries that may indicate an adversary's attempt to gather intelligence before launching further attacks. The alert focuses on event signals categorized under the 'windows' operating system type and relies on filtering conditions to identify outlier behaviors based on historical data. The response and investigation procedures outlined aim to assist analysts in understanding the context of the alert, validating the processes involved, and mitigating any identified threats effectively.
Categories
  • Endpoint
Data Sources
  • Process
  • User Account
  • Network Traffic
Created: 2023-09-22