
Summary
This detection rule aims to identify potentially suspicious command-line arguments associated with Electron applications, such as Microsoft Teams, Discord, and Slack. These applications use Chromium or similar frameworks and may be utilized for malicious activities, like proxy execution of a signed binary. By analyzing the command-line inputs during the process creation phase, specifically those containing certain flags (e.g., `--browser-subprocess-path`, `--gpu-launcher`), the rule seeks to flag any unusual activity that could indicate exploitation or abuse of the Electron framework. The selection criteria also check the image names of the processes being executed, matching them against known Electron applications. Given that these applications are commonly used in workplace settings, there exists a risk of false positives, especially in scenarios where developers or IT staff might utilize these flags for legitimate debugging. Thus, it is important to review flagged instances carefully to avoid disrupting normal operations.
Categories
- Endpoint
- Windows
- Application
Data Sources
- Process
Created: 2023-09-05