
Summary
This detection rule identifies instances where common web browsers like Chrome, Edge, or Firefox spawn processes that are typically associated with malicious activity. Specifically, it looks for browser processes that launch well-known scripting utilities or command-line interpreters (such as cmd.exe or powershell.exe) in a manner that deviates from normal behavior. This type of process hierarchy is often indicative of drive-by downloads, exploitation of browser vulnerabilities, or the installation of persistent malicious tools via browser extensions. Such behavior aligns with recognized tactics employed in various malware campaigns and security testing operations.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
- User Account
ATT&CK Techniques
- T1218
- T1059
Created: 2025-07-22