
Summary
This detection rule targets instances where the 'sqlservr.exe' process spawns a command shell (cmd.exe) or a PowerShell process. Such behavior is frequently indicative of command execution initiated from within SQL Server, often exploited through SQL injection vulnerabilities or via the use of extended stored procedures like 'xp_cmdshell'. By monitoring specific Windows events, particularly those captured by Sysmon Event ID 1 and Windows Event Log Security ID 4688, organizations can identify potentially malicious activity where legitimate SQL Server processes might be leveraged to execute command shells. The rule provides an automated method to surface these events, which could signify unauthorized command execution in a database environment.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1505
- T1505.001
Created: 2025-02-04