heroui logo

Suspect Svchost Activity

Sigma Rules

View Source
Summary
This rule is designed to detect suspicious activities where the Windows process `svchost.exe` is created without any command-line arguments (CLI). The absence of arguments in `svchost.exe` creation is highly unusual and typically indicates potential malicious activity, especially when it is spawned by processes like `rpcnet.exe` or `rpcnetp.exe`. These parent processes are known to be associated with malware or backdoor functionality. The detection mechanism involves monitoring process creation events in the Windows environment, with a specific focus on command-line arguments. The rule captures instances where `svchost.exe` is invoked directly without any parameters, implying that it may be a cover for code injection or other nefarious actions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2019-12-28