
Summary
This detection rule focuses on identifying potential privilege escalation attempts on Windows systems through the misuse of debug privileges by arbitrary parent processes. The rule triggers when suspicious child processes, such as PowerShell or CMD, are spawned by known system processes, including winlogon.exe, lsass.exe, and others, especially if executed by specific users identified as AUTHORITY and AUTORI. The detection involves checking the command line arguments of the spawned processes, filtering for unusual commands that suggest modification of network routes. The rule is designed to uncover stealthy privilege escalation techniques commonly employed by attackers to compromise systems, emphasizing the critical need for monitoring process creation activities on Windows environments.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-10-28