
Summary
This rule identifies suspicious executable files launched by PowerShell and other related processes. Specifically, it focuses on scenarios where executables such as cmd.exe, cscript.exe, or rundll32.exe are executed as child processes of PowerShell. This detection is significant because threat actors often exploit PowerShell to run malicious scripts disguised as normal processes. It could indicate malicious behaviors associated with known threat actor groups such as APT29, APT34, APT41, and others, and is particularly relevant in recent geopolitical contexts involving Russia and Ukraine. By leveraging Event Code 1 from Sysmon logs, the rule constructs a query that captures relevant events with the right parent and child process relationships, allowing security teams to monitor and respond to potential threats in a timely manner.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1059.001
- T1059.003
Created: 2024-02-09