heroui logo

Remote Thread Creation By Uncommon Source Image

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious remote thread creation events initiated by uncommon source images on Windows systems. Remote thread creation is a common technique used by attackers for privilege escalation and evasion, as it allows the execution of code in the context of another process. The rule specifically targets processes that are generally not expected to initiate remote thread activities, including but not limited to Internet Explorer, Microsoft Office applications, and system processes like ‘winlogon.exe’. By filtering out known benign cases where remote threads should occur (e.g., certain Windows system processes creating threads), this rule aims to highlight suspicious activity that could indicate a compromise. A notable aspect of the detection logic involves the use of exclusion filters based on known parent processes and target images to reduce false positives, emphasizing the need for tunable thresholds in operational environments. This rule is designed for security monitoring tools that process Windows event logs, making it highly relevant for enterprise environments looking to bolster their threat detection capabilities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
Created: 2019-10-27