
Summary
The 'Suspicious Process Creation CallTrace' rule is designed to monitor Windows systems for signs of potential code injection attacks. It identifies scenarios where a newly created process is immediately accessed by the same parent process from an unknown memory code region. This behavior is often indicative of malicious activity, particularly concerning code injection tactics where attackers manipulate a process's execution to obfuscate their actions and evade security measures. The rule operates by analyzing event logs collected from Sysmon and Winlogbeat integrations, focusing specifically on the creation and access actions of processes commonly used by productivity and scripting tools such as Microsoft Office applications and command-line utilities. The rule outlines several investigations and response steps, recommending detailed traces of process relationships, abnormal behavior assessments, and incident response actions tailored for suspected threats.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Logon Session
- Application Log
- Network Traffic
ATT&CK Techniques
- T1055
Created: 2021-10-24