
Summary
This detection rule focuses on monitoring and identifying the execution of arbitrary processes through the Squirrel.exe binary, which is commonly found in Electron-based applications such as Slack, Teams, and Discord. The Squirrel framework is employed for managing updates in these applications but can be exploited by attackers to bypass security and execute malicious commands. The rule captures process creation events where Squirrel.exe or specific update executables are invoked with particular command-line arguments that signify the initiation of another process. It includes filters to reduce false positives from legitimate updates in popular applications, ensuring higher accuracy in detection. The rule identifies potential abuse of legitimate software for executing unauthorized tasks and strives to mitigate risks stemming from such scenarios.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-06-09