heroui logo

Excessive distinct processes from Windows Temp

Splunk Security Content

View Source
Summary
The rule identifies abnormal behavior related to process execution from the Windows\Temp directory, a common tactic associated with post-exploit frameworks such as Koadic and Meterpreter. Specifically, it detects instances where an excessive number of distinct processes (more than 37) are spawned within a 20-minute window. By analyzing data from Endpoint Detection and Response (EDR) agents, including Sysmon events and Windows security logs, the rule assesses potential threats to system integrity. Such behavior is indicative of attempts to execute arbitrary code, escalate privileges, and establish persistence, thus warranting immediate investigation to mitigate any ongoing or potential attack.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1059
Created: 2024-11-13