heroui logo

Windows Cmdline Tool Execution From Non-Shell Process

Splunk Security Content

View Source
Summary
This detection rule identifies suspicious instances where command-line tools like `ipconfig.exe`, `systeminfo.exe`, and others are executed by non-standard shell parent processes. Typical command-line environments such as CMD, PowerShell, or Explorer are excluded, focusing on potentially malicious behavior indicative of an attacker utilizing injected processes for system discovery. This behavior has been observed in threat actor activities, notably with FIN7's JSSLoader, suggesting that confirmed instances could indicate adversarial reconnaissance leading to further exploitation or lateral movement within a network. The detection leverages telemetry from Endpoint Detection and Response (EDR) solutions, capturing process creation events that warrant vigilant monitoring.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Active Directory
ATT&CK Techniques
  • T1059
  • T1059.007
Created: 2025-01-13