
Summary
This detection rule focuses on identifying potentially malicious activity within Windows environments by analyzing process creation events. It specifically targets well-known Windows processes, such as svchost.exe, taskhost.exe, and others, that have suspicious parent processes. The rule implements various filters to exclude benign scenarios, including processes spawned by common security tools and those originating from recognized Windows directories (System32, SysWOW64). It detects instances where these known system processes are initiated by unusual parent processes, which can be indicative of a defense evasion technique or process injection attack. By leveraging the hierarchical nature of Windows processes, this rule aids in delineating legitimate from illegitimate behavior, enhancing situational awareness for security teams. Overall, this rule contributes to a more robust understanding of process relationships and helps to mitigate risks associated with dubious process activity.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2019-02-23