heroui logo

Suspicious Child Process of AspNetCompiler

Sigma Rules

View Source
Summary
This detection rule is designed to identify potentially malicious activity by monitoring child processes spawned from 'aspnet_compiler.exe', a legitimate .NET framework utility used to precompile ASP.NET applications. The rule specifically targets instances where 'aspnet_compiler.exe' is used to launch non-standard child processes such as 'calc.exe' or 'notepad.exe', which are typically benign but may indicate an attacker's attempt to utilize these processes for defense evasion or other malicious activities. Additionally, it tracks child processes that are executed from suspicious directories such as 'C:\Users\Public\', 'C:\AppData\Local\Temp\', and other typical locations used for malicious activity to camouflage execution. The detection is conditional upon the parent process being 'aspnet_compiler.exe' and the child's image path matching the defined criteria, ensuring only a specific set of behaviors triggers an alert. This rule is relevant in environments where .NET applications are deployed and is a proactive measure to mitigate the risk of exploitation through the misuse of the ASP.NET compilation tool.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2023-08-14