
Summary
This detection rule focuses on identifying potential malicious activity involving the Sysinternals Sysmon service through the use of the 'findstr' command. The specific indicator of interest is the use of the command line argument '385201', which is associated with the default driver altitude of the Sysmon service. This behavior may indicate that an attacker is attempting to discover or manipulate the Sysmon service, often used for logging system activity for monitoring or forensic purposes. The rule is triggered by monitoring for process creation events where either 'find.exe' or 'findstr.exe' is used, alongside the presence of the specific argument mentioned. This could help identify suspicious discovery attempts that exploit standard administrative tools to gain further visibility of the system's configuration or security measures.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1518.001
Created: 2021-12-16