
Summary
The detection rule identifies suspicious parent-child process relationships involving `cmd.exe` on Windows systems. Specifically, it flags instances of `cmd.exe` that are launched from unusual parent processes (e.g., `lsass.exe`, `csrss.exe`, among others), which may indicate malicious activity. The rule operates by examining the Windows event logs to find process creation events where the process type is `start`, focusing on `cmd.exe` and its parent processes. A notable aspect of this rule is its emphasis on differentiating legitimate uses of `cmd.exe` from those that might be exploitive, capturing a crucial vector for threat actors who exploit command-line interfaces for nefarious purposes. The risk score is set to 47, indicating a medium level of risk. It is critical for analysts to review the context of detected events to validate or debunk suspicious activity and respond accordingly, making this rule a vital component of proactive security monitoring within Windows environments.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- Network Traffic
- User Account
ATT&CK Techniques
- T1059
Created: 2020-08-21