heroui logo

Python Execution

Anvilogic Forge

View Source
Summary
The Python Execution detection rule was designed to identify malicious activities involving the execution of Python scripts and commands on Windows systems. Python is widely recognized for its flexibility, which may be exploited by threat actors to execute unauthorized scripts or commands. This rule particularly focuses on monitoring processes that utilize 'python.exe' or have a '.py' file extension in their execution path. The implementation involves querying EDR logs from CrowdStrike, filtering results from the last two hours to detect any relevant activity. Notably, associations have been made with several threat actors including APT28, APT36, and MuddyWater, all of whom have been known to employ Python for malicious acts. The detection logic is formulated using Snowflake SQL syntax and aims to enhance incident response by pinpointing potentially dangerous Python executions.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1046
  • T1059.006
Created: 2024-02-09