
Summary
This detection rule identifies suspicious activity related to child processes spawned from applications located in the WindowsApps directory. This could indicate the potential execution of malicious '.appx' packages, often associated with malware deployment that takes advantage of licensed applications on Windows. The detection uses various selection criteria to pinpoint potentially abusive command-line executions triggered from legitimate applications. If the ParentImage leads to the WindowsApps directory, and the child process corresponds to known potentially dangerous executables, this rule may trigger an alert. Additionally, it carefully filters out legitimate activity originating from certain authorized applications, such as the Windows Terminal, to minimize false positives. The rule is configured to operate with a medium severity level, reflecting a concern that should be monitored without causing unnecessary alerts.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-01-12