
Summary
The rule identifies suspicious child processes spawned by the Java interpreter. Such behavior may suggest attempts to execute malicious JAR files or exploit JAVA vulnerabilities. The detection is powered by monitoring processes where the Java interpreter acts as the parent process. Key investigation steps include tracing the parent process, checking for unusual behavior, examining command lines, and correlating any associated alerts. Risk management requires distinguishing between legitimate processes and anomalies that could indicate threats, emphasizing the necessity of analyzing execution context and system behavior. This rule is essential for detecting exploitation attempts and malicious activity related to Java processes, helping organizations to prompt incident responses and implement remediation actions.
Categories
- Endpoint
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1059
- T1059.007
Created: 2021-01-19