heroui logo

High Number of Process Terminations

Elastic Detection Rules

View Source
Summary
This rule detects a high volume of process terminations executed via the `pkill` command from the same host within a short timeframe, specifically 10 instances. This behavior often indicates malicious activity, as attackers may use such actions to disable crucial business applications or security processes to facilitate further exploits like encryption of files, typically observed during ransomware attacks. The rule utilizes a threshold detection mechanism to trigger alerts when the defined criteria are met and requires data sourced from Elastic's Defend and Auditd Manager. Comprehensive investigation steps are recommended to analyze and respond to detected incidents, including examining session activities and potentially re-imaging affected systems. The associated risk score is 47, which positions it at a medium severity level, demanding prompt investigation and response to mitigate possible impacts.
Categories
  • Endpoint
Data Sources
  • Process
  • User Account
  • Container
ATT&CK Techniques
  • T1489
Created: 2022-07-27