
Summary
The rule identifies instances where Devtoolslauncher.exe executes a specified binary by monitoring process creation events on Windows systems. Devtoolslauncher.exe is a legitimate binary used in various deployment scenarios, but attackers may exploit it to execute malicious payloads. The detection logic focuses on instances where the command line associated with the execution of Devtoolslauncher.exe contains the phrase 'LaunchForDeploy'. This condition helps differentiate between typical benign uses of the executable and potential abuse by attackers. By analyzing the image path and command line arguments of newly spawned processes, the rule aims to alert security analysts to suspicious activities potentially indicative of defense evasion or other malicious actions.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2019-10-12