
Summary
The detection rule "Unusual Execution via Microsoft Common Console File" identifies instances where a child process is spawned from a Microsoft Common Console (MSC) file. Attackers may exploit MSC files to execute malicious commands stealthily. The rule is structured to search for process start events where the parent process is the Microsoft Management Console (MMC), specifically looking for arguments ending in '.msc' but not from standard MSC file paths. The potential malicious activity is assessed through a risk score of 73, labeled as high severity. Investigative steps include scrutinizing the source of the MSC file, the process execution chain, and user account behavior. The response actions outlined are designed to manage incidents and remediations effectively, emphasizing the importance of isolating the affected host and running comprehensive malware scans.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- Network Traffic
- User Account
ATT&CK Techniques
- T1204
- T1204.002
- T1566
- T1566.001
- T1566.002
Created: 2024-05-12