Create signature for spawning/injecting many processes #174
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is a simple signature to detect malware with large process trees. One indicator for malware is lots of processes, this includes injection, creation or even running command windows etc as well as malware trying to be evasive (or rather annoying when viewing) by spawning large process trees from copies of itself.
Anyway as mentioned simple and just take action based on the number of processes minus 1 for the parent process. Tested on various samples. I pondered whether or not to display the processes as appended information but decided against it as wasted processing time as user can click on behavior tab and see them anyway one this has been highlighted to them.
Also on a side note any feedback regarding the ransomware message submission now the suggested improvements have been made and tested as not had feedback since?