heroui logo

Anomalous Windows Process Creation

Elastic Detection Rules

View Source
Summary
The rule 'Anomalous Windows Process Creation' is designed to detect unusual parent-child process relationships that may indicate malicious activities on Windows systems. This detection leverages machine learning to identify instances where a legitimate application spawns processes that exhibit non-standard behavior, often associated with malware execution or persistence methods. Exploits may involve a benign application like Excel or Word invoking a script to download and execute malware when an infected document is opened. By monitoring process behaviors, the rule aims to catch new and emerging threats that typical anti-virus solutions might overlook. False positives may occur during legitimate IT operations, software installations, or unexpected service activity. The detection employs multiple Osquery queries to collect relevant information about DNS cache, services, and unsigned executables linked to VirusTotal, providing additional context during investigations. It integrates findings from its machine learning framework with Osquery outputs to provide a comprehensive approach for recognizing potential threats.
Categories
  • Windows
  • Endpoint
  • Application
  • Cloud
Data Sources
  • Process
  • Application Log
  • Command
  • Network Traffic
ATT&CK Techniques
  • T1543
Created: 2020-03-25