heroui logo

Suspicious MSBuild Spawn

Splunk Security Content

View Source
Summary
The 'Suspicious MSBuild Spawn' detection rule identifies abnormal executions of msbuild.exe triggered by wmiprvse.exe, which typically does not initiate msbuild.exe processes under normal usage scenarios. This behavior may indicate misuse of the Windows Management Instrumentation (WMI) COM object, potentially leading to malicious activities such as code execution or system compromise. The rule utilizes telemetry from Endpoint Detection and Response (EDR) agents, specifically monitoring process creation events through Sysmon Event ID 1 and Windows Event Log Security 4688. It flags this unusual process relationship for further investigation, as legitimate uses of msbuild.exe are primarily through the Visual Studio environment (devenv.exe). A detection of this nature warrants a review of the executing process to ascertain if it is part of a legitimate deployment or a malicious attack vector.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1127.001
  • T1127
Created: 2024-11-13