heroui logo

Remote Thread Creation In Uncommon Target Image

Sigma Rules

View Source
Summary
This detection rule identifies instances of remote thread creation targeting uncommon processes in a Windows environment. The primary focus is to monitor for the creation of threads in specific target images, such as calc.exe, mspaint.exe, and others, which are typically less associated with legitimate uses of remote thread creation. The rule includes multiple filters to reduce false positives, such as filtering out activity initiated from common processes like csrss.exe and specialized processes from VMware and Xerox that might create threads in the target images under legitimate circumstances. The intention is to discern suspicious activities potentially indicative of malicious intent or evasion tactics typically used by attackers to escalate privileges or bypass detection mechanisms. The rule's context serves to enhance visibility into potential misuse of standard applications, potentially leveraging them for nefarious activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-03-16