heroui logo

Memory Threat - Prevented- Elastic Defend

Elastic Detection Rules

View Source
Summary
The 'Memory Threat - Prevented - Elastic Defend' detection rule generates an alert when Elastic Defend identifies malicious activities related to memory signatures in endpoint processes. This rule is essential for recognizing in-memory threats, which circumvent traditional security by executing code without writing it to disk. It is specifically designed to catch prevented malware signatures and shellcode execution attempts, allowing security teams to address threats effectively. Key investigation avenues include assessing the process execution chains, looking for Yara signature matches, and reviewing suspicious memory regions. The rule captures alerts from the 'logs-endpoint.alerts-*' index and outputs alerts every five minutes, with the capability to generate up to 10,000 signals per execution. Implementing this rule entails using the broader Elastic Defend alerting framework, which enhances overall detection coverage. False positives may arise from legitimate Yara matches, necessitating careful analysis during triage. The maturation of this rule from testing to production reflects its anticipated impact in aiding security analysts in combating sophisticated memory-based attacks.
Categories
  • Endpoint
Data Sources
  • Process
  • Container
  • Image
ATT&CK Techniques
  • T1055
  • T1620
Created: 2024-03-24