
Summary
The detection rule identifies potentially suspicious child processes initiated by DiskShadow.exe, a Windows utility used for creating and managing shadow copies of disk volumes. The presence of certain child processes, including certutil.exe, cscript.exe, mshta.exe, powershell.exe, pwsh.exe, regsvr32.exe, rundll32.exe, and wscript.exe, is flagged as potentially malicious when spawned by DiskShadow.exe. This behavior may indicate attempts to circumvent standard security measures such as application whitelisting or parent/child process auditing, suggesting potential evasive tactics utilized by malicious actors.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-09-15