Rules: Abnormal Parent-Child Process Combination
This alert detects a Windows process spawned by a parent process that does not normally spawn it.
Detail | Value |
---|---|
Type | Templated Match |
Category | Execution |
Apply Risk to Entities | device_ip, user_username, device_hostname |
Signal Name | Abnormal Parent-Child Process Combination |
Summary Expression | Process: {{baseImage}} spawned by Parent Process: {{parentBaseImage}} on host: {{device_hostname}} by user: {{user_username}} |
Score/Severity | Static: 3 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1036, _mitreAttackTechnique:T1036.004, _mitreAttackTechnique:T1036.005 |
- CrowdStrike - FDR
- Digital Guardian - ARC
- Microsoft - Azure
- Microsoft - Office 365
- Microsoft - Windows
- VMware - Carbon Black Cloud
Origin | Field |
---|---|
Normalized Schema | baseImage |
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | parentBaseImage |
Normalized Schema | user_username |