heroui logo

Crowdstrike Unusual Parent Child Processes

Panther Rules

View Source
Summary
This detection rule, titled "Crowdstrike Unusual Parent Child Processes", aims to identify potentially malicious activity by monitoring unusual pairings of parent and child processes on Windows systems. It analyzes the process relationships where a normally benign parent process (like 'excel.exe') spawns a child process that is known to be questionable (like 'cmd.exe'). The rule includes criteria such as command line arguments, parent process identities, and various hashes to determine if a child process exhibits suspicious characteristics. The detection logic categorically flags unexpected relationships, raising alerts on critical severity findings when such behavior occurs. The rule is defined to run against logs from Crowdstrike's Falcon Data Replication (FDR) events, with a deduplication period set to 60 minutes to minimize redundant alerts during ongoing threat analysis.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2023-05-01