
Summary
The detection rule targets the execution of "dctask64.exe", which is a signed binary used by ManageEngine Endpoint Central, developed by ZOHO Corporation. While dctask64.exe is a legitimate tool, its capability allows for malicious activities such as DLL injection and executing arbitrary commands or processes. The rule identifies potential abuse by looking for specific indicators in process creation logs. It flags instances where the binary is executed, particularly focusing on its ImpHash values that are known to be associated with malicious activities, and also checks for command line parameters commonly used for executing commands or injecting dynamic link libraries (DLLs). This detection is crucial for identifying potential threats where legitimate administrative tools are exploited for unauthorized actions within the environment. Given the sensitivity of the processes controlled through this binary, this rule serves as a proactive measure to mitigate risks associated with process creation anomalies.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-01-28