
Summary
This detection rule aims to identify rare instances of remote thread creation initiated by uncommon or suspicious source processes on Windows systems. By evaluating the source images that trigger the creation of remote threads, the rule harnesses a predefined list of legitimate Windows executables. The malicious activity targeted by this rule could lead to privilege escalation or evasion of defenses by using legitimate processes to perform illicit actions in the system context. The rule operates on the premise that most legitimate applications do not typically engage in remote thread creation, hence unusual occurrences may indicate compromise or malicious intent. It is essential for the rule to be tested within a specific environment to establish an appropriate baseline and minimize false positives. By examining processes with specific endings in their file paths, security teams can enhance their detection capabilities against sophisticated threats that leverage uncommon process behaviors.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2019-10-27