heroui logo

Create Remote Thread In Shell Application

Splunk Security Content

View Source
Summary
The detection rule 'Create Remote Thread In Shell Application' focuses on identifying suspicious process injection activities specifically within command shell applications like `cmd.exe`, `powershell.exe`, and `pwsh.exe`. It employs Sysmon EventCode 8 to monitor for remote thread creation, a technique commonly exploited by malicious actors, notably malware families such as IcedID, to inject and execute malicious code within legitimate processes. This technique can enable attackers to execute arbitrary commands, escalate their privileges, or maintain persistence, thus posing significant security risks to systems. The rule leverages logs from Sysmon to collect data necessary for identifying such malicious behavior effectively. An implementation prerequisite is the ingestion of relevant log data that includes process and command-line details, ensuring that systems running Sysmon (version >= 6.0.4) are monitored accordingly.
Categories
  • Endpoint
Data Sources
  • Pod
  • Process
  • File
ATT&CK Techniques
  • T1055
Created: 2024-12-10