
Summary
This rule, authored by Elastic, is designed to detect a potential evasion tactic known as 'herpaderping', which involves the execution of a process that subsequently overwrites an executable file associated with the same parent process. The term 'herpaderping' refers to a stealth maneuver used by malware to execute malicious code in a less detectable manner by disguising it as legitimate processes. The rule leverages a sequential query in EQL (Event Query Language) to track process executions that follow a specific set of criteria including matching directory paths for potential execution points in Windows. If a parent process matches known legitimate executable paths and is associated with a critical file overwrite event, this may be indicative of malicious activity. A high-risk score of 73 signals a significant threat level, necessitating close monitoring for such behaviors in endpoint events, particularly on Windows systems.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
ATT&CK Techniques
- T1036
Created: 2020-10-27