heroui logo

Suspicious process Spawned by Java

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify instances where the Java runtime environment (specifically `java.exe`) spawns a suspicious process, which may be indicative of an exploitation attack, particularly that of the log4j vulnerability (CVE-2021-44228). The rule utilizes event logs to look for the creation of new processes (EventID 4688) where the parent process is `java.exe` and the child process is one of several known suspicious executables often associated with malicious activity, such as PowerShell, cmd.exe, and other system binaries that could be misused in an attack context. By inspecting these event logs, it helps in the early detection of potential breaches or advanced persistent threats (APTs) linked to threat actors like Evilnum and Volt Typhoon.
Categories
  • Endpoint
  • Web
  • Application
Data Sources
  • Process
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1203
Created: 2024-02-09