heroui logo

CDB Execution

Anvilogic Forge

View Source
Summary
The detection rule titled 'CDB Execution' specifically targets the use of the 'cdb.exe' Windows component. CDB, which is commonly used in legitimate debugging processes, can also be exploited by attackers to execute shellcode, set up network connections, or interact with other processes in a Windows environment. The rule is designed to capture instances where CDB is launched with specific command-line arguments that may indicate malicious activity, such as remote process execution or other suspicious actions. Given its association with living-off-the-land attacks, this rule aids in identifying potential exploitation of this legitimate tool by threat actors, particularly those associated with known frameworks like Metador. The logic employs Splunk queries to extract relevant sysmon event logs, filtering for command-line arguments that suggest suspicious use of CDB. This rule thus enhances endpoint security by monitoring and alerting on potential misuse of a common Windows binary.
Categories
  • Windows
Data Sources
  • Process
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1127
Created: 2024-02-09