heroui logo

Windows SpeechRuntime Suspicious Child Process

Splunk Security Content

View Source
Summary
The rule titled 'Windows SpeechRuntime Suspicious Child Process' is designed to detect potentially malicious activities associated with the Windows SpeechRuntime.exe. This executable is vulnerable to COM Hijacking attacks, which allow an attacker to execute arbitrary code in the context of the logged-on user by modifying the Windows registry to point to a malicious DLL instead of the legitimate one. When the COM object is triggered, it results in the execution of the malicious DLL through SpeechRuntime.exe. The detection rule identifies suspicious child processes spawned by SpeechRuntime.exe, particularly when they involve commonly used system-level executables like cmd.exe, PowerShell, rundll32.exe, and others that could signify exploitation attempts. This detection strategy leverages data from Sysmon and Windows Event Logs to monitor process creation events where these relationships exist.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1021.003
Created: 2025-08-22