heroui logo

Potentially Suspicious Child Process Of VsCode

Sigma Rules

View Source
Summary
This detection rule identifies potentially suspicious child processes spawned from the Visual Studio Code (VsCode) process, specifically `code.exe`. It focuses on identifying unusual process chains which might indicate attempts at persistence or execution of malicious tasks using VsCode's capabilities such as tasks or terminal profiles. The rule checks for parent processes that end with `\code.exe` and evaluates several conditions for child processes, including common utilities like `calc.exe`, `regsvr32.exe`, `rundll32.exe`, and scripts executed by `powershell.exe`, `pwsh.exe`, and `cmd.exe`. The detection conditions are designed to catch any child process whose command line arguments suggest suspicious functionality, particularly function invocations that might signify malicious activity. False positives are acknowledged for environments where developers use VsCode extensively, emphasizing the importance of context in evaluating alerts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-01-26