heroui logo

Svchost spawning Cmd

Elastic Detection Rules

View Source
Summary
This detection rule identifies suspicious process behavior where 'cmd.exe' is spawned from 'svchost.exe'. The service host process (Svchost.exe) is a legitimate system process that can manage multiple Windows services. When 'cmd.exe' is created by 'svchost.exe', it indicates a potential misuse of system processes, possibly for privilege escalation or other malicious activities. Analysts should investigate the execution chain for anomalies, examine logs for related activities leading up to the event, and gather additional data to ascertain whether the behavior is indicative of malware or a compromise. The investigation may involve querying the DNS cache, registry, and services running under user accounts to identify any associated suspicious behavior or artifacts. This rule targets Windows operating systems and is integrated with Elastic Stack components, leveraging real-time process event data to facilitate rapid detection and response to potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • User Account
  • Network Traffic
ATT&CK Techniques
  • T1059
Created: 2020-02-18