Skip to content

Commit 955e973

Browse files
authored
Change description and name of problemchild ML detection-rules (#4545)
Changed description and name of problemchild ML detection-rules
1 parent 28a06fd commit 955e973

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_host.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
creation_date = "2023/10/16"
33
integration = ["problemchild", "endpoint", "windows"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/03/19"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

99
[rule]
1010
anomaly_threshold = 75
1111
author = ["Elastic"]
1212
description = """
13-
A machine learning job combination has detected a set of one or more suspicious Windows processes with unusually high
14-
scores for malicious probability. These process(es) have been classified as malicious in several ways. The process(es)
13+
A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit
14+
unusually high malicious probability scores.These process(es) have been classified as malicious in several ways. The process(es)
1515
were predicted to be malicious by the ProblemChild supervised ML model. If the anomaly contains a cluster of suspicious
1616
processes, each process has the same host name, and the aggregate score of the event cluster was calculated to be
1717
unusually high by an unsupervised ML model. Such a cluster often contains suspicious or malicious activity, possibly
@@ -21,7 +21,7 @@ from = "now-45m"
2121
interval = "15m"
2222
license = "Elastic License v2"
2323
machine_learning_job_id = "problem_child_high_sum_by_host"
24-
name = "Suspicious Windows Process Cluster Spawned by a Host"
24+
name = "Host Detected with Suspicious Windows Process(es)"
2525
references = [
2626
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
2727
"https://docs.elastic.co/en/integrations/problemchild",
@@ -63,7 +63,7 @@ note = """## Triage and analysis
6363
> **Disclaimer**:
6464
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6565
66-
### Investigating Suspicious Windows Process Cluster Spawned by a Host
66+
### Investigating Host Detected with Suspicious Windows Process(es)
6767
6868
The detection leverages machine learning to identify clusters of Windows processes with high malicious probability scores. Adversaries exploit legitimate tools, known as LOLbins, to evade detection. This rule uses both supervised and unsupervised ML models to flag unusual process clusters on a single host, indicating potential masquerading tactics for defense evasion.
6969

rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_parent_process.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
creation_date = "2023/10/16"
33
integration = ["problemchild", "endpoint", "windows"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/03/19"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

99
[rule]
1010
anomaly_threshold = 75
1111
author = ["Elastic"]
1212
description = """
13-
A machine learning job combination has detected a set of one or more suspicious Windows processes with unusually high
14-
scores for malicious probability. These process(es) have been classified as malicious in several ways. The process(es)
13+
A machine learning job combination has identified a parent process with one or more suspicious Windows processes that exhibit
14+
unusually high malicious probability scores. These process(es) have been classified as malicious in several ways. The process(es)
1515
were predicted to be malicious by the ProblemChild supervised ML model. If the anomaly contains a cluster of suspicious
1616
processes, each process has the same parent process name, and the aggregate score of the event cluster was calculated to
1717
be unusually high by an unsupervised ML model. Such a cluster often contains suspicious or malicious activity, possibly
@@ -21,7 +21,7 @@ from = "now-45m"
2121
interval = "15m"
2222
license = "Elastic License v2"
2323
machine_learning_job_id = "problem_child_high_sum_by_parent"
24-
name = "Suspicious Windows Process Cluster Spawned by a Parent Process"
24+
name = "Parent Process Detected with Suspicious Windows Process(es)"
2525
references = [
2626
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
2727
"https://docs.elastic.co/en/integrations/problemchild",
@@ -65,7 +65,7 @@ note = """## Triage and analysis
6565
> **Disclaimer**:
6666
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6767
68-
### Investigating Suspicious Windows Process Cluster Spawned by a Parent Process
68+
### Investigating Parent Process Detected with Suspicious Windows Process(es)
6969
7070
In Windows environments, processes are often spawned by parent processes, forming a hierarchy. Adversaries exploit this by using legitimate processes to launch malicious ones, often leveraging Living off the Land Binaries (LOLBins) to evade detection. The detection rule employs machine learning to identify clusters of processes with high malicious probability, focusing on those sharing a common parent process. This approach helps uncover stealthy attacks that traditional methods might miss, enhancing defense against tactics like masquerading.
7171

rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_user.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
creation_date = "2023/10/16"
33
integration = ["problemchild", "endpoint", "windows"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/03/19"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

99
[rule]
1010
anomaly_threshold = 75
1111
author = ["Elastic"]
1212
description = """
13-
A machine learning job combination has detected a set of one or more suspicious Windows processes with unusually high
14-
scores for malicious probability. These process(es) have been classified as malicious in several ways. The process(es)
13+
A machine learning job combination has identified a user with one or more suspicious Windows processes that exhibit
14+
unusually high malicious probability scores. These process(es) have been classified as malicious in several ways. The process(es)
1515
were predicted to be malicious by the ProblemChild supervised ML model. If the anomaly contains a cluster of suspicious
1616
processes, each process has the same user name, and the aggregate score of the event cluster was calculated to be
1717
unusually high by an unsupervised ML model. Such a cluster often contains suspicious or malicious activity, possibly
@@ -21,7 +21,7 @@ from = "now-45m"
2121
interval = "15m"
2222
license = "Elastic License v2"
2323
machine_learning_job_id = "problem_child_high_sum_by_user"
24-
name = "Suspicious Windows Process Cluster Spawned by a User"
24+
name = "User Detected with Suspicious Windows Process(es)"
2525
references = [
2626
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
2727
"https://docs.elastic.co/en/integrations/problemchild",
@@ -65,7 +65,7 @@ note = """## Triage and analysis
6565
> **Disclaimer**:
6666
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6767
68-
### Investigating Suspicious Windows Process Cluster Spawned by a User
68+
### Investigating User Detected with Suspicious Windows Process(es)
6969
7070
The detection leverages machine learning to identify clusters of Windows processes with high malicious probability, often linked to tactics like masquerading. Adversaries exploit legitimate tools (LOLBins) to evade detection. This rule uses both supervised and unsupervised ML models to flag unusual process clusters, focusing on user-associated anomalies to uncover potential threats.
7171

0 commit comments

Comments
 (0)