heroui logo

Windows Suspicious VMWare Tools Child Process

Splunk Security Content

View Source
Summary
This analytic rule identifies suspicious child processes spawned by the <code>vmtoolsd.exe</code>, which is the VMware Tools service on Windows systems that typically operates with SYSTEM privileges. By monitoring process relationships, particularly those initiated by <code>vmtoolsd.exe</code>, this detection aims to reveal potential exploitation attempts which could leverage vulnerabilities like <b>CVE-2023-20867</b>. Such exploitation can result in granting attackers SYSTEM-level access, enabling them to execute arbitrary commands, escalate privileges, and potentially lead to complete system compromise. The rule utilizes insights from Endpoint Detection and Response (EDR) agents to track process behaviors that may indicate malicious activity.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1059
Created: 2025-07-30