
Summary
This detection rule identifies suspicious child processes that are spawned by calc.exe, which is often a sign of DLL side-loading techniques leveraged by malware, specifically Qakbot. The analytic utilizes telemetry from Endpoint Detection and Response (EDR) systems, focusing on process GUIDs, names, and parent processes to detect this behavior. The significance of detecting such anomalies lies in their potential to allow attackers to execute arbitrary code, escalate privileges, and maintain persistence within the environment, thereby posing a considerable risk. The implemented search queries data from Windows Event Logs and Sysmon to analyze process activities.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
ATT&CK Techniques
- T1574.002
- T1574
Created: 2024-11-13