heroui logo

Suspicious Windows Command Shell Arguments

Elastic Detection Rules

View Source
Summary
The threat detection rule identifies the execution of the Windows Command Shell (cmd.exe) with suspicious command-line arguments, which are often indicative of malware installation activities. This rule is designed to monitor process creation events for cmd.exe on Windows systems and evaluate the command-line arguments passed to it to detect potentially harmful actions. The rule leverages various suspicious patterns commonly utilized in attacks, such as invoking PowerShell commands, downloading payloads, and other methods typical of malicious behavior. A high-risk score (73) emphasizes the importance of prompt investigation when triggered. By filtering out known benign processes and validating the context of the command execution (e.g., parent process, user account behavior), the rule aims to reduce false positives while enhancing the detection of threats. The supporting analysis includes guidance on investigation steps, potential false positives, and specific response actions, making it a critical component of an organization's endpoint security strategy.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
  • Logon Session
  • Application Log
  • Network Share
ATT&CK Techniques
  • T1059
  • T1059.003
Created: 2024-09-06