
Summary
This rule identifies instances where the processes 'java.exe' or 'w3wp.exe' spawn a Windows shell, such as 'cmd.exe' or 'powershell.exe'. Such behavior is often indicative of exploitation attempts, particularly those linked to vulnerabilities like CVE-2021-44228 (commonly known as Log4Shell). The detection utilizes data from Endpoint Detection and Response (EDR) agents, focusing on process and parent process relationships, which allows for the identification of potentially malicious activity on endpoints. If confirmed, these incidents could lead to unauthorized command execution, system compromise, data exfiltration, or lateral movement within a network. It is crucial for organizations to monitor and analyze these events to mitigate the risk of significant security breaches that can result from such exploitation behaviors.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1190
- T1133
Created: 2024-12-16