heroui logo

Trusted Developer Application Usage

Elastic Detection Rules

View Source
Summary
This rule identifies suspicious activity that may indicate potential abuse of Windows trusted developer utilities. Specifically, it looks for processes typically associated with trusted developer applications, such as MSBuild.exe and msxsl.exe, which may be invoked by malicious actors leveraging the trust normally given to legitimate software. The detection is based on monitoring process events where the category is 'process' and the event type is either 'start' or 'process_started'. The rule is aware of the possibility of false positives, particularly with legitimate developers using these tools. It is designed to help security teams identify and mitigate risks posed by attackers attempting to evade defenses by utilizing trusted development tools.
Categories
  • Windows
  • Endpoint
  • Application
  • Identity Management
Data Sources
  • Process
  • Application Log
  • Windows Registry
ATT&CK Techniques
  • T1127
Created: 2020-02-18