SigmaHQ/rules/windows/process_creation/win_susp_taskmgr_parent.yml
Yugoslavskiy Daniil 05cc7e455d atc review
2019-03-06 05:25:12 +01:00

27 lines
570 B
YAML

title: Taskmgr as Parent
status: experimental
description: Detects the creation of a process from Windows task manager
tags:
- attack.defense_evasion
- attack.t1036
author: Florian Roth
date: 2018/03/13
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\taskmgr.exe'
filter:
Image:
- resmon.exe
- mmc.exe
condition: selection and not filter
fields:
- Image
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative activity
level: low