
Summary
The 'High Process Termination Frequency' detection rule identifies anomalies in process terminations on endpoint systems, specifically tracking instances where 15 or more processes are terminated within a 3-second timeframe. This analytic utilizes Sysmon Event Code 5 logs to capture the relevant data. Such high-frequency terminations are often indicative of malicious activities, particularly behaviors associated with ransomware attacks, where attackers attempt to rapidly terminate processes to evade detection while encrypting files. Should the analytics flag such behavior, it suggests a possible ransomware incident, thus triggering an investigation to prevent potential data loss. This rule thus serves as an early warning mechanism against severe threats.
Categories
- Endpoint
Data Sources
- Pod
ATT&CK Techniques
- T1486
Created: 2024-11-13