
Summary
This detection rule identifies instances of the DLLHost.exe process being executed without command line arguments, a behavior that is often indicative of malicious activity, particularly associated with tools like Cobalt Strike. Typically, DLLHost.exe requires command line parameters to function properly; the absence of those parameters may signify an attempt to evade detection mechanisms. By analyzing data from Endpoint Detection and Response (EDR) agents, specifically focusing on process execution logs (Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2), the rule can trigger alerts for potentially dangerous activity. If identified as malicious, such activity can lead to severe threats like credential theft or unauthorized file manipulations.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1055
Created: 2024-11-13