
Summary
This rule is designed to detect instances where a Windows command line executable is spawned from the Microsoft Management Console (MMC). When the MMC application is misused, particularly during lateral movement, it may invoke scripts or command-line utilities to execute malicious activities. The rule tests for two conditions: it checks if the process's parent image is 'mmc.exe' and, in parallel, it determines if the child processes are among a specified set of command-line tools, including common scripts and executables like 'cmd.exe', 'powershell.exe', and others including 'BITSADMIN'. The detection is labeled with high confidence due to the specific combination of parent and child processes indicating potentially unauthorized execution pathways. This detection helps in identifying lateral movement tactics that cyber attackers may leverage to compromise systems within a network, serving as a crucial alert component to potential intrusion events.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2019-08-05