Skip to content

Latest commit

 

History

History
37 lines (30 loc) · 1.4 KB

MATCH-S00139.md

File metadata and controls

37 lines (30 loc) · 1.4 KB

Rules: Abnormal Parent-Child Process Combination

Description

This alert detects a Windows process spawned by a parent process that does not normally spawn it.

Additional Details

Detail Value
Type Templated Match
Category Execution
Apply Risk to Entities device_ip, user_username, device_hostname
Signal Name Abnormal Parent-Child Process Combination
Summary Expression Process: {{baseImage}} spawned by Parent Process: {{parentBaseImage}} on host: {{device_hostname}} by user: {{user_username}}
Score/Severity Static: 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1036, _mitreAttackTechnique:T1036.004, _mitreAttackTechnique:T1036.005

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema parentBaseImage
Normalized Schema user_username