
Summary
The rule detects anomalous executions of the `dllhost.exe` process, specifically when it is spawned without command line arguments. The absence of command line parameters during the creation of this typically system-related process is unusual and may signify potential process injection attempts or the execution of malware that is attempting to mimic legitimate system processes. The detection logic looks for any instance where `dllhost.exe` is executed without additional command line information, which raises suspicion given its standard operations in the Windows environment. As such activities are rarely legitimate, this rule is important for spotting potentially harmful activities.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
- Logon Session
Created: 2022-06-27