heroui logo

Unusual Parent Process for cmd.exe

Elastic Detection Rules

View Source
Summary
The detection rule identifies suspicious parent-child process relationships involving `cmd.exe` on Windows systems. Specifically, it flags instances of `cmd.exe` that are launched from unusual parent processes (e.g., `lsass.exe`, `csrss.exe`, among others), which may indicate malicious activity. The rule operates by examining the Windows event logs to find process creation events where the process type is `start`, focusing on `cmd.exe` and its parent processes. A notable aspect of this rule is its emphasis on differentiating legitimate uses of `cmd.exe` from those that might be exploitive, capturing a crucial vector for threat actors who exploit command-line interfaces for nefarious purposes. The risk score is set to 47, indicating a medium level of risk. It is critical for analysts to review the context of detected events to validate or debunk suspicious activity and respond accordingly, making this rule a vital component of proactive security monitoring within Windows environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
  • User Account
ATT&CK Techniques
  • T1059
Created: 2020-08-21