heroui logo

Potential Binary Proxy Execution Via VSDiagnostics.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the execution of "VSDiagnostics.exe" when it is used with the "start" command, which indicates an attempt to proxy arbitrary binaries. The rule focuses on monitoring command-line arguments that suggest unauthorized or malicious activity, particularly those involving launching other processes through this utility. The presence of command-line parameters such as '/launch:' or '-launch:' in conjunction with the execution of `VSDiagnostics.exe` raises an alert as these could be indicative of a defense evasion technique used by attackers to obscure their activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-08-03