heroui logo

Detect Prohibited Applications Spawning cmd exe

Splunk Security Content

View Source
Summary
This detection rule identifies instances where `cmd.exe` is spawned by processes that are not typically associated with launching it. The analytic utilizes telemetry provided by Endpoint Detection and Response (EDR) systems, including process GUID, process names, parent processes, and command-line parameters. Such behavior often signifies potential malicious intent, as attackers frequently abuse legitimate processes to execute unauthorized commands or scripts, leading to risks like unauthorized code execution and privilege escalation. The rule focuses on processes that typically do not spawn `cmd.exe`, thereby enhancing detection accuracy. If `cmd.exe` is invoked under these conditions, it warrants further investigation. The rule analysis entails examining data from Sysmon, Windows Event Logs, and CrowdStrike's process monitoring, ensuring a comprehensive overview of endpoint activity.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1059
  • T1059.003
Created: 2024-11-13