heroui logo

Suspicious Electron Application Child Processes

Sigma Rules

View Source
Summary
The rule detects potentially malicious child processes spawned by Electron-based applications, such as Teams, Discord, and Slack. These applications can be manipulated or abused through the execution of '.asar' files or by passing specific command-line arguments to launch untrusted scripts or binaries. The detection focuses on parent processes that are known Electron applications and checks their child processes for suspicious activities like the execution of command-line utilities like 'cmd.exe', 'powershell.exe', or scripts that could indicate a compromise. Furthermore, it inspects paths where these child processes are executed, targeting areas like 'ProgramData', 'Temp', and 'AppData'. False positives are expected, particularly from unknown sources, and the detection leverages Windows process creation logs to identify and flag these behaviors.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2022-10-21