
Summary
This detection rule identifies potentially malicious use of SettingSyncHost.exe, a legitimate Microsoft process, as a Launch Object Library (LOLBin). LOLBins are benign tools that attackers leverage to execute arbitrary code without raising immediate suspicion. In this case, the rule looks for instances where SettingSyncHost.exe is used as a parent process to execute a hijacked or malicious binary, specifically when the command line contains indicators such as 'cmd.exe /c' or 'RoamDiag.cmd' along with an '-outputpath' argument. The rule further employs a filtering condition to ensure that the detected process is not part of system utilities located in the common Windows directories (C:\Windows\System32\ or C:\Windows\SysWOW64\). By monitoring process creation events and analyzing the command line arguments, this rule aims to uncover attackers' techniques for evading detection while exploiting legitimate Windows processes to carry out their malicious activities.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-02-05