heroui logo

GenAI Process Compiling or Generating Executables

Elastic Detection Rules

View Source
Summary
This detection rule identifies activities where Generative AI (GenAI) tools spawn compilers or packaging tools to create executable files. The rule is particularly focused on the use of popular Python packaging tools (like PyInstaller and Nuitka) and various compilation tools (e.g., GCC, Clang, .NET compilers) that are leveraged by attackers to generate malware autonomously. The expectation is that legitimate workflows rarely involve autonomous generation and compilation of executables by GenAI processes, making such activities a red flag for potential malicious intent. The rule sets a high risk threshold, considering both command line inputs and the parent processes associated with activity, enabling the identification of behavior consistent with malicious activity while filtering out benign operations. Triage steps include reviewing the process and outputs, user account verification, investigation of temporally aligned suspicious activities, and thorough analysis of any generated executables. Special attention is given to temporary folders commonly used for malware storage, and the potential risks associated with the deriving executables are highlighted through actionable remediation steps.
Categories
  • Endpoint
Data Sources
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T0053
  • T1027
  • T1027.004
Created: 2025-12-04