
Summary
The detection rule "Remote Thread from Suspicious Folder" identifies potentially malicious activities associated with the creation of remote threads originating from unconventional or suspicious directories, such as Temporary Internet Files, the Temp folder, Downloads, and Appdata. This rule is particularly relevant given the association with advanced persistent threat (APT) groups, such as APT10/menuPass and TA413, as well as specific malware like Black Basta and LOWZERO. The rule operates by utilizing Splunk, employing Sysmon event logs to capture EventCode 8 which indicates process creation due to remote threads. It further filters out the events that originate from the specified folders, utilizing regex to pinpoint processes launched in these directories. The collected data is then organized and summarized using the `stats` command to provide insights into the identified events based on host information, user specifics, and various process attributes. This detection rule serves to strengthen security postures against evasion tactics that leverage process injection techniques. In terms of technical mappings, this rule corresponds to MITRE techniques for defense evasion and privilege escalation linked to process injection (T1055).
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1055
Created: 2024-02-09