heroui logo

Notepad with no Command Line Arguments

Splunk Security Content

View Source
Summary
This rule is designed to detect instances where Notepad.exe is executed without any command-line arguments, a behavior that can indicate potential misuse by malicious actors, particularly those utilizing the SliverC2 framework. Utilizing data from various sources, including Sysmon EventID 1 and Windows Event Logs, the rule focuses on process creation events that show Notepad activity in a short time. Such executions can signify attempts to inject malicious code, as attackers often exploit legitimate applications to bypass traditional security measures. If such behaviors are confirmed to be malicious, they can lead to arbitrary code execution and unauthorized access to the system. The detection is further enhanced by leveraging EDR telemetry to track Notepad processes closely and correlate them with known tactics and behaviors associated with advanced persistent threats (APTs) and other malicious activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1055
Created: 2024-11-13