heroui logo

Unusual Parent Process For Cmd.EXE

Sigma Rules

View Source
Summary
The 'Unusual Parent Process For Cmd.EXE' rule is designed to detect instances where the Windows command interpreter 'cmd.exe' is launched by an atypical parent process. In standard operation, 'cmd.exe' is generally initiated by well-known system processes. Indicators of compromise are flagged when 'cmd.exe' is spawned by certain processes that are not typically associated with command execution. This behavior may suggest malicious activities such as the execution of scripts or commands related to exploitation or unauthorized access. The rule leverages processes such as 'csrss.exe', 'ctfmon.exe', and 'lsass.exe' as potential parental sources triggering alerts. Its detection mechanism is thorough, targeting a broad range of known parent processes that, when associated with the invocation of 'cmd.exe', may warrant scrutiny due to the potential for evasion tactics used by malware. The rule is placed at a medium alert level, indicating the need for further investigation upon detection.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-09-21