SigmaHQ/rules/windows/process_creation/win_susp_taskmgr_parent.yml

29 lines
649 B
YAML
Raw Normal View History

title: Taskmgr as Parent
2019-11-12 22:12:27 +00:00
id: 3d7679bd-0c00-440c-97b0-3f204273e6c7
status: experimental
description: Detects the creation of a process from Windows task manager
2019-03-06 04:25:12 +00:00
tags:
- attack.defense_evasion
- attack.t1036
author: Florian Roth
date: 2018/03/13
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\taskmgr.exe'
filter:
Image:
2019-06-17 12:57:41 +00:00
- '*\resmon.exe'
- '*\mmc.exe'
- '*\taskmgr.exe'
condition: selection and not filter
fields:
- Image
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative activity
level: low