heroui logo

Potentially Suspicious Execution From Parent Process In Public Folder

Sigma Rules

View Source
Summary
This detection rule identifies potentially suspicious executions occurring from parent processes within the public user folder on Windows systems. Specifically, it focuses on cases where a process located in the '\Users\Public' directory spawns a child process that is associated with known shell or scripting binaries, such as powershell.exe, cmd.exe, and similar tools. This behavior can indicate an execution of undesired or malicious scripts, particularly in scenarios where legitimate applications are hijacked or exploited for further execution. The rule utilizes a rule-based detection logic where it checks for the execution of specific child processes that are flagged as potentially malicious when initiated from the public folder, thereby providing an early warning signal for possible exploitation or containment scenarios. The identification of such processes aids cybersecurity teams in proactively addressing threat vectors that leverage legitimate system commands to execute harmful activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-02-25