
Summary
The detection rule identifies suspicious child processes initiated by the legitimate Windows executable `provlaunch.exe`. This detection is crucial as the `provlaunch.exe` process is typically associated with the provisioning of user profiles but can be exploited by attackers to launch malicious processes within a Windows environment. This rule specifically looks for child processes created by `provlaunch.exe` that end with known executable file names frequently used in post-exploitation scenarios (e.g., `calc.exe`, `powershell.exe`, etc.) or that are located in directories commonly associated with temporary files and logs, which could indicate an attempt to conceal malicious activity. The method of detection involves monitoring process creation events and filtering those where the parent process is `provlaunch.exe` while verifying the conditions of the child processes. Given the various legitimate uses of these processes, false positives are marked as 'Unknown', highlighting the potential for benign operations to trigger alerts. The detection level is classified as high, indicating a significant risk associated with any identified behavior.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-08-08