
Summary
The detection rule identifies suspicious child processes spawned by the Script Event Consumer (scrcons.exe) on Windows platforms. Given that scrcons.exe is a legitimate Windows component often used in automation tasks and scripts, rogue child processes may indicate malicious activity. The rule triggers on process creation events where the parent process is scrcons.exe and the created process matches a list of potentially malicious executables, such as svchost.exe, powershell.exe, and others. By monitoring these high-risk process relationships, security teams can detect potential attacks leveraging the Script Event Consumer to execute unauthorized commands or scripts.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-06-21