heroui logo

Suspicious Parent Process for lsass.exe or services.exe

Anvilogic Forge

View Source
Summary
This detection rule monitors for potentially malicious activities involving the Windows local security authority subsystem (lsass.exe) and the service control manager (services.exe). Such processes are critical components of the Windows operating system responsible for handling security policies and managing services. Typically, lsass.exe and services.exe should have wininit.exe as their expected parent process. When either of these processes is spawned by an unexpected or suspicious parent process, it may suggest process injection techniques, including process hollowing or masquerading behaviors commonly exploited by attackers to compromise a system. This rule uses Splunk queries to analyze endpoint data for instances where the parent process differs from the expected wininit.exe, thereby flagging potentially harmful activities. By filtering logs and applying regex checks, the rule aims to identify abnormal parent-child relationships for these critical Windows processes, focusing on those that indicate defense evasion tactics.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
  • Sensor Health
ATT&CK Techniques
  • T1036.004
  • T1055
Created: 2025-09-19