
Summary
This detection rule identifies the execution of the taskkill.exe command with specific parameters indicating an attempt to forcibly terminate processes. Such behavior can signify malicious intent, especially when targeting security tools or essential applications, which is a common tactic used by malware operators. By monitoring Sysmon events, Windows Event Log security events, and CrowdStrike data, the rule watches for executions involving taskkill.exe to determine potentially suspicious process termination activities. The searches are structured to analyze parent-child relationships between processes, enhancing the rule's ability to detect when critical processes are being killed, thereby alerting security teams to possible evasion attempts by attackers.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
- User Account
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.001
Created: 2024-11-22