heroui logo

Windows Common Abused Cmd Shell Risk Behavior

Splunk Security Content

View Source
Summary
This rule identifies malicious command line behavior observed in Windows environments based on multiple detection analytics. It activates when four or more distinct analytics suggest potentially harmful activities related to command line interface usage on a specific host. Such command line activities may include attempts to execute unauthorized commands, access sensitive data, and manipulate configurations of the system or network settings, indicating higher risks such as unauthorized access or privilege escalation. As attackers attempt to employ these tactics, this rule serves as a critical signpost for potential compromise and highlights the need for proactive monitoring and response. The implementation of this rule requires Splunk Enterprise Security and should be calibrated based on the environment to minimize false positives, ensuring a balance between sensitivity and specificity in threat detection.
Categories
  • Endpoint
  • Windows
Data Sources
  • Command
ATT&CK Techniques
  • T1222
  • T1049
  • T1033
  • T1529
  • T1016
  • T1059
Created: 2025-01-20