
Summary
This detection rule is designed to identify potential malicious child processes spawned by the Manage Engine ServiceDesk Plus application, which could be exploited in attacks targeting this Java web service. The rule specifically looks for processes initiated by the Manage Engine ServiceDesk parent image or `java.exe` and checks if the child processes match a predefined list of suspicious executable names, such as `powershell.exe`, `calc.exe`, `curl.exe`, etc. Additionally, the rule incorporates a filter to specifically check for instances where the `net.exe` or `net1.exe` processes are stopped, suggesting possible unwanted behavior. The overall goal is to enhance the security monitoring of the Manage Engine ServiceDesk environment by ensuring any unauthorised or suspicious process creation is flagged for review, thereby preventing exploitation of this service by malicious actors.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-01-18