
Summary
The rule titled 'Suspicious Explorer Child Process' identifies potential misuse of the Windows Explorer process to launch malicious child processes, such as scripts or executables, that could indicate a security threat. Specifically, it detects when trusted processes like cscript.exe, wscript.exe, and others are initiated by explorer.exe with suspicious command arguments, particularly the '-Embedding' argument which suggests a DCOM invocation. The rule filters out benign processes related to known CLSID identifiers to reduce false positives. By analyzing the parent-child process relationships, the detection aims to uncover malicious behaviors that otherwise leverage legitimate Windows operations. The rule provides a detailed framework for response and remediation, highlighting the importance of investigating the context of the parent process and the executed commands to confirm the legitimacy of the activity and mitigate risks associated with potential exploitation.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- Network Traffic
- File
ATT&CK Techniques
- T1566
- T1566.001
- T1566.002
- T1059
- T1059.001
- T1059.003
- T1059.005
- T1218
Created: 2020-10-29