
Summary
The rule titled 'Process Injection - Prevented - Elastic Endgame' identifies and alerts on process injection attempts that have been mitigated by Elastic Endgame, a cybersecurity tool designed to prevent malicious activities. Implemented through a query triggered every 10 minutes, the rule filters for alerts generated within the last 15 minutes, specifically looking for events that are marked as alerts from the Endgame module. It utilizes specific event kinds and actions that correspond to kernel shellcode events, which are typical indicators of process injection attempts. The rule aims to generate a high volume of alerts to capture as many incidents as possible, while being aware that its ability to produce alerts may be limited by the overarching Kibana configuration settings for maximum alerts.
Categories
- Endpoint
- Web
- Cloud
- Windows
- Linux
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- WMI
- Cloud Storage
- Internet Scan
- Group
- Application Log
- Logon Session
- Network Traffic
- Process
ATT&CK Techniques
- T1055
Created: 2020-02-18