heroui logo

Wab/Wabmig Unusual Parent Or Child Processes

Sigma Rules

View Source
Summary
This detection rule identifies potential nefarious behavior associated with the wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes. It highlights unusual parent-child process relationships that could indicate malicious activity, particularly linked to the Bumblebee loader, a known malware framework utilized for various cyber attacks. The rule triggers when either the wab.exe or Wabmig.exe processes have a parent process that is unusual or when they spawn child processes. This behavior is especially concerning as it diverges from the expected usage patterns of these legitimate Windows components. By monitoring these criteria, the detection rule aims to enhance visibility into potentially harmful activities attempting to leverage Windows system tools.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2022-08-12