
Summary
This rule is designed to detect suspicious processes that are initiated by a parent process originating from the Users\Public directory. Adversaries may leverage various scripting and command-line interpreters to execute malicious commands or scripts while obscuring their activities. By monitoring the execution of processes such as PowerShell, WMI scripts, and common command-line tools within a public directory, the detection mechanism aims to uncover potentially harmful actions taken by adversaries while also offering a means to understand behavioral patterns indicative of evasion tactics. Utilizing Sysmon event data (EventCode=1) enables the identification of such activities where the parent process path matches the specified conditions. The rule employs regex matching to further refine the output and highlight related process attributes.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
- Windows Registry
ATT&CK Techniques
- T1059
- T1564
Created: 2024-02-09