SigmaHQ/rules/windows/process_creation/win_susp_taskmgr_parent.yml
2019-11-12 23:12:27 +01:00

29 lines
649 B
YAML

title: Taskmgr as Parent
id: 3d7679bd-0c00-440c-97b0-3f204273e6c7
status: experimental
description: Detects the creation of a process from Windows task manager
tags:
- attack.defense_evasion
- attack.t1036
author: Florian Roth
date: 2018/03/13
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\taskmgr.exe'
filter:
Image:
- '*\resmon.exe'
- '*\mmc.exe'
- '*\taskmgr.exe'
condition: selection and not filter
fields:
- Image
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative activity
level: low