
Summary
This detection rule targets the execution of processes that have a null command line, which is atypical behavior for certain Windows processes. Adversaries often use process injection techniques to introduce their code into legitimate processes, providing them with potentially escalated privileges and access to sensitive system resources while trying to evade detection from security solutions. The logic captures Windows process events that are executed within a two-hour window, looking specifically for popular processes that could be targets for injection, such as svchost.exe, rundll32.exe, and others. By identifying these processes running without a command line argument, the detection rule aims to flag potential malicious activities indicative of process injection techniques. Such anomalies often suggest an attempt to circumvent security measures designed to protect the integrity and confidentiality of a system.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
- Logon Session
ATT&CK Techniques
- T1055
Created: 2024-02-09