
Summary
The rule "Uncommon Child Process Of DefaultPack.EXE" is designed to detect the execution of uncommon child processes spawned from the "DefaultPack.EXE" binary. The rule targets the behavior of this particular executable, which is often utilized as a proxy for launching other applications in potentially malicious activities. It primarily focuses on monitoring the process creation events on Windows systems, specifically filtering for instances where the parent process ends with 'DefaultPack.exe'. The detection logic employs a selection condition to identify these specific process creation events, aiming to reveal unusual or unauthorized activities that diverge from typical usage patterns. The emphasis on detecting uncommon child processes indicates a proactive approach to mitigating risks associated with process exploitation and potential evasion tactics employed by malicious actors. Given its medium severity level, the rule seeks to balance sensitivity to attacks with the need to minimize false positives. Note that the rule has been referenced in context with various security sources, underscoring its relevance in threat detection frameworks.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Logon Session
Created: 2022-12-31