heroui logo

Unusual Parent-Child Relationship

Elastic Detection Rules

View Source
Summary
This detection rule identifies unusual parent-child relationships between processes on Windows systems, where certain programs execute under unexpected parent processes. Such anomalous behavior may indicate attempts at process injection, masquerading, or privilege escalation, which are common tactics used by attackers. The rule monitors various log sources, including Winlogbeat, Microsoft Defender, and endpoint detection logs from Crowdstrike and SentinelOne. By analyzing the execution chain of processes, the rule can help security teams identify potentially malicious activities based on deviations from typical process hierarchies. The collected actions include querying service details, checking unsigned executables, and monitoring network connections related to flagged processes, thereby supporting detailed forensic investigations and appropriate incident response activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
  • Application Log
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1055
  • T1055.012
Created: 2020-02-18