heroui logo

Unusual Executable File Creation by a System Critical Process

Elastic Detection Rules

View Source
Summary
This detection rule targets the creation or modification of executable files by system-critical processes on Windows systems, a behavior often indicative of a security breach or exploitation attempt. The rule employs EQL (Event Query Language) to filter events from multiple data sources, notably those associated with Windows event logging, including Winlogbeat, Sysmon, and Microsoft Defender for Endpoint, among others. It focuses specifically on instances where specific critical processes such as 'services.exe', 'lsass.exe', and others are involved in file operations that result in non-deletion of executable files ('exe' or 'dll'). The associated risk score is classified as high, reflecting the severity of activities that could compromise system integrity. Additionally, an extensive investigation and triage process is recommended for handling incidents triggered by this detection, incorporating tools like Osquery to analyze DNS cache and services, and leveraging threat intelligence resources to assess file hashes against known malicious entries. The rule's purpose aligns with tactics in MITRE ATT&CK framework, particularly concerning defense evasion and execution exploitation. The recommended response plan involves immediate incident response actions such as host isolation and malware scanning, alongside systematic analysis to prevent future occurrences.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • File
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1211
  • T1203
Created: 2020-08-19