heroui logo

Conhost.exe Kernel call

Anvilogic Forge

View Source
Summary
The detection rule identifies potentially malicious activity associated with Conhost.exe, primarily focusing on the use of the ForceV1 API call to interact with the kernel space. This behavior is indicative of possible exploitation attempts that fall within the realm of defense evasion and indirect command execution. The rule uses a Snowflake-based query to extract relevant process execution logs from EDR systems, specifically targeting instances where Conhost executes but excludes legitimate paths associated with Windows updates and system operations. The rule aims to identify correlations with known threats like Trojan.Killdisk, HermeticWiper, and the Snatch malware. It draws attention to patterns where Conhost is involved in executing additional suspicious processes, assisting defenders in detecting and investigating anomalies in a timely manner.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
  • Sensor Health
ATT&CK Techniques
  • T1202
  • T1059
  • T1211
Created: 2024-02-09