heroui logo

Process Discovery via Tasklist

Elastic Detection Rules

View Source
Summary
This detection rule identifies potential process discovery activities on a Windows system by monitoring the execution of the `tasklist.exe` command, which adversaries may use to gather information about currently running processes after gaining access to a system. The rule queries the relevant logs to detect events where `tasklist.exe` is initiated, classified as a process start event. Its primary function is to flag potentially malicious use of the tasklist command, which is part of the broader discovery tactics employed by adversaries. The rule incorporates a moderate risk score of 21, indicating a low level of severity.
Categories
  • Windows
  • Endpoint
  • Infrastructure
  • Identity Management
Data Sources
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1057
Created: 2020-02-18