heroui logo

Windows ConHost with Headless Argument

Splunk Security Content

View Source
Summary
This detection rule targets the execution of the Windows Console Host process (conhost.exe) with the undocumented --headless argument, which is rarely utilized in legitimate scenarios. The presence of this argument indicates that an attacker may be attempting to execute commands without drawing attention, thus making it a significant red flag in cybersecurity monitoring. The rule leverages data from Endpoint Detection and Response (EDR) sources, particularly from Sysmon and Windows Event Logs, to monitor for such anomalies. If this behavior is confirmed as malicious, it could facilitate persistence, lateral movements, or other forms of malicious activities that might lead to data breaches or system compromises. Security operations centers (SOCs) need to be vigilant for this particular pattern as it signals potential threats from sophisticated attackers.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1564.003
  • T1564.006
Created: 2024-12-10