heroui logo

Explorer Process Tree Break

Sigma Rules

View Source
Summary
The rule 'Explorer Process Tree Break' is designed to detect a specific method of process execution on Windows systems, where malicious actors utilize 'explorer.exe' as a means to execute arbitrary commands or binaries. Typically, this method mimics the command line execution behavior of 'cmd.exe /c', but it has the added property of disrupting the process tree by creating a new instance of 'explorer.exe' that spawns from 'svchost'. This behavior can be indicative of an evasion technique used by attackers to hide malicious actions within benign applications. The rule looks for command lines that contain a specific factory GUID or elements typical of 'explorer.exe' invocation, which can include '/root,'. By flagging processes that stem from these executions, the rule assists in identifying potentially malicious activities that leverage legitimate system processes to obfuscate their true intentions.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
  • Logon Session
Created: 2019-06-29