
Summary
This detection rule targets specific process creation events related to svchost.exe on Windows systems. The intention is to flag any instances of svchost.exe that are being executed with uncommon or suspicious parent processes, which may indicate potential malware or evasion techniques being employed on the system. The rule specifically looks for the svchost.exe executable and filters out known, benign parent processes (like Mrt.exe or MsMpEng.exe) to reduce false positives. If svchost.exe is executed with a parent process not included in the allowed list, or if the parent process is null, empty, or set to a placeholder value, the detection condition is met. This helps in identifying potentially malicious instances of svchost.exe that are not part of normal operational behavior, assisting in early detection of possible attacks or compromises.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2017-08-15