SigmaHQ/rules/windows/process_creation/win_susp_userinit_child.yml
2020-10-15 19:51:42 -03:00

26 lines
722 B
YAML

title: Suspicious Userinit Child Process
id: b655a06a-31c0-477a-95c2-3726b83d649d
status: experimental
description: Detects a suspicious child process of userinit
references:
- https://twitter.com/SBousseaden/status/1139811587760562176
author: Florian Roth (rule), Samir Bousseaden (idea)
date: 2019/06/17
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\userinit.exe'
filter1:
CommandLine|contains: '\\netlogon\\'
filter2:
Image|endswith: '\explorer.exe'
condition: selection and not filter1 and not filter2
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative scripts
level: medium