
Summary
This detection rule identifies suspicious child processes spawned by the VMware Tools daemon (vmtoolsd.exe), which may suggest an attempt to achieve persistence on a Windows system. The rule specifically looks for certain indicators associated with common scripting and command-line utilities such as cmd.exe, PowerShell, and others that are commonly misused for malicious purposes. It sets conditions to detect scenarios where these processes are executed by vmtoolsd.exe, filtering out legitimate script executions associated with VMware Tools operations. The conditions require that if a child process is initiated, it must match the specified parent-child relationship while ensuring that it does not fall under specific criteria that might imply normal operational behavior.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-10-08