
Summary
This detection rule identifies instances when a Chrome or Chromium-based browser is launched with the `--no-sandbox` flag, a potential indicator of suspicious or malicious activity. Although this flag can be legitimately used in software development or testing environments, its presence in regular user activities is rare. Threat actors often exploit this flag to bypass the browser’s security measures, allowing them to execute malicious scripts or establish command and control channels. This behavior is frequently associated with malware components that use Chromium for tasks such as credential theft, UI spoofing, or other nefarious operations. Analysts are advised to scrutinize these events, particularly when they stem from unusual parent processes like `powershell.exe` or `cmd.exe`, or when there are accompanying indicators, such as file drops, process injection, or unexpected outbound network traffic. By focusing on command-line flags and process lineage, organizations can effectively lower false positives and enhance the precision of their threat detections.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1497
Created: 2025-05-26