
Summary
This rule is designed to detect unusual command line parameters used when instances of `svchost.exe` are launched in a Windows environment. The purpose of monitoring `svchost.exe`, a critical system process that hosts multiple Windows services, is to identify potential malicious activity such as process injection or the masquerading of a malicious file as a legitimate process. By excluding known legitimate command-line patterns, the rule focuses on parameters that diverge from normal behaviors. The detection mechanism involves checking the command line associated with the `svchost.exe` instances, applying specific filters to eliminate benign processes initiated by trusted applications like Microsoft Defender (MsMpEng.exe) and Microsoft's Malicious Software Removal Tool (MRT.exe). If an `svchost.exe` is executed with parameters that fall outside of these known patterns, an alert will trigger, indicating a potential security threat. The intent is to enhance the detection of advanced threats and help system administrators quickly respond to suspicious activities in their environments.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2025-11-14