
Summary
This rule detects the execution of uncommon child processes that are spawned from the "sigverif.exe" process on Windows machines. The sigverif.exe program is a legitimate Windows tool used for verifying the signatures of system files and drivers. However, it can be abused by adversaries as a living-off-the-land (LOL) binary to execute malicious tasks without raising immediate suspicion. By monitoring for unexpected child processes initiated by sigverif.exe, the detection aims to capture potential misuse scenarios, such as those involving process injection or execution of unauthorized commands. The detection is designed with conditions to ensure processes that are common or expected, such as WerFault.exe (related to error reporting), do not trigger false positives. This enhances the rule's reliability by minimizing alerts from benign software behaviors while focusing on capturing potentially harmful activities that seek to leverage legitimate tools for malicious purposes.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2022-08-19