heroui logo

Potential Binary Proxy Execution Via Cdb.EXE

Sigma Rules

View Source
Summary
The detection rule identifies potential binary proxy execution activities that leverage the cdb.exe debugger to run arbitrary commands or processes. It focuses specifically on the invocation of cdb.exe, which is part of the Windows debugging tools, to execute commands defined in a debugger script file. The rule employs two main selection criteria: it checks for process creation involving cdb.exe either through its file name or by examining specific command line arguments that typically denote script execution. False positives may arise during legitimate debugging processes; hence, the detection is classified as medium risk. This rule can aid in identifying unauthorized usage of debugging tools in a way that may bypass traditional security mechanisms.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2019-10-26