heroui logo

Uncommon Link.EXE Parent Process

Sigma Rules

View Source
Summary
The detection rule titled "Uncommon Link.EXE Parent Process" focuses on identifying potentially malicious activities associated with the Windows utility LINK.EXE, commonly used as an incremental linker in Microsoft Visual Studio installations. The rule aims to mitigate the risk of an attacker sideloading malicious binaries by executing legitimate tools that normally call LINK.EXE. This could occur if one of these tools (e.g., editbin.exe, dumpbin.exe, etc.) is run from an untrusted location, as they are hardcoded to invoke LINK.EXE without verifying its integrity. To effectively identify these scenarios, the rule filters for instances where LINK.EXE is launched from uncommon parent processes, indicating a deviation from expected behavior. The filtering is conducted based on the known paths of the Visual Studio installation and its associated utilities. If the detection criteria, which require LINK.EXE to be initiated with a specific command line and not from approved paths, are met, the event is flagged as suspicious, allowing security teams to investigate further.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-08-22