heroui logo

Suspicious SearchProtocolHost no Command Line Arguments

Splunk Security Content

View Source
Summary
This detection rule identifies instances of the Windows executable 'searchprotocolhost.exe' running without any command line arguments, a behavior that is often deemed suspicious. Such occurrences are typically associated with malicious activities, including tactics employed by threat actors like those using Cobalt Strike. The analytics rely on telemetry from Endpoint Detection and Response (EDR) systems, specifically focusing on process execution data. The absence of command line arguments when this executable runs can indicate an evasion tactic aimed at avoiding detection mechanisms. If confirmed, this suspicious behavior could facilitate unauthorized execution of code, potential credential theft, or other harmful actions within an enterprise environment. This rule is crucial not only for identifying possible threats but also for understanding the context of execution to ensure comprehensive security monitoring.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1055
Created: 2024-11-13