
Summary
The 'Known Process Injection Commands' detection rule targets the process injection technique employed by adversaries to execute arbitrary code in other processes, allowing them to evade security mechanisms and potentially elevate their privileges. This rule specifically monitors PowerShell executions that utilize commands commonly associated with process injection activities. The rule is built on a Snowflake query logic that filters events from a specific data source, 'crowdstrikefdr_process', within the last two hours, focusing on Windows platform events. The regular expression used in the query detects known API calls indicative of process injection, such as 'VirtualAlloc', 'LoadLibrary', 'WriteProcessMemory', and others that facilitate the process injection technique. By identifying these command executions, the rule aims to enhance the detection capabilities for potential malicious behavior related to process manipulation and code execution. The underlying premise is that successful detection can alert security teams to potential intrusions or malicious activities disguised within trusted processes.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1055
Created: 2024-02-09