heroui logo

Potential Process Injection Via Msra.EXE

Sigma Rules

View Source
Summary
The rule detects potential process injection activities that utilize the Microsoft Remote Assistance application (Msra.exe) as a parent process. Msra.exe has been frequently exploited by malicious actors to facilitate unauthorized remote access and establish persistence within compromised systems. The detection focuses on identifying suspicious child processes spawned from Msra.exe, listing specific executable names such as arp.exe, cmd.exe, net.exe, and others which are commonly used in attack vectors. The conditions for triggering the detection include checking if the parent image or command line ends with 'msra.exe' and ensuring that the child process is one of the specified potentially malicious executables. This rule plays a critical role in monitoring and protecting Windows environments by catching attempts at process injection that may stem from the misuse of remote assistance tools.
Categories
  • Windows
Data Sources
  • Process
Created: 2022-06-24