heroui logo

Lolbin Runexehelper Use As Proxy

Sigma Rules

View Source
Summary
This rule detects the execution of 'runexehelper.exe' as a means of launching other processes, often employed in tactics that bypass traditional security mechanisms by masking malicious activity. 'Runexehelper.exe' is recognized as a LOLBins (Living Off the Land Binaries) executable, which attackers often misuse for executing payloads or other programs stealthily. The rule specifically targets process creation events where 'runexehelper.exe' is the parent image of the spawned process. Given that it can be utilized for both benign and malicious activities, the detection of this binary running in unusual contexts may indicate potential threats or circumventions of security practices. False positives may arise due to legitimate usage, so careful analysis and contextualization are advised in responses to alerts generated by this rule.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-12-29