
Summary
This analytic rule detects the execution of potentially malicious command line processes, specifically when initiated by winrshost.exe, which is associated with Windows Remote Management (WinRM). This behavior suggests an attempt to execute payloads or commands via CMD or PowerShell, indicative of unauthorized access or lateral movement within a compromised environment. The detection leverages Sysmon EventID 1 and Windows Event Log Security Event ID 4688, establishing a clear relationship between the parent process (winrshost.exe) and the child processes (cmd.exe and any PowerShell variants). By focusing on this anomaly, security teams can identify potential exploitation of remote management tools that may lead to severe security incidents.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Windows Registry
- Process
ATT&CK Techniques
- T1021.006
Created: 2024-12-12