heroui logo

Chromium Browser Instance Executed With Custom Extension

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potential malicious activity involving Chromium-based browsers such as Chrome, Brave, Edge, Opera, and Vivaldi. The rule specifically looks for instances where a browser process is started with the 'load-extension' command line flag, which indicates the execution of a custom or additional extension. This behavior can be associated with persistence mechanisms in malware, allowing attackers to inject malicious scripts or functionalities into a web browser. By monitoring for these particular command-line arguments, the rule aims to flag unusual or unauthorized browser instances that may be indicative of an attack or compromise, necessitating further investigation. It is important to note that legitimate usage of Chrome extensions in certain testing tools like BurpSuite may trigger this alert, resulting in potential false positives. Therefore, context and additional correlation may be required when interpreting triggers from this rule.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-06-19