You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -63,7 +63,7 @@ note = """## Triage and analysis
63
63
> **Disclaimer**:
64
64
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
65
65
66
-
### Investigating Suspicious Windows Process Cluster Spawned by a Host
66
+
### Investigating Host Detected with Suspicious Windows Process(es)
67
67
68
68
The detection leverages machine learning to identify clusters of Windows processes with high malicious probability scores. Adversaries exploit legitimate tools, known as LOLbins, to evade detection. This rule uses both supervised and unsupervised ML models to flag unusual process clusters on a single host, indicating potential masquerading tactics for defense evasion.
Copy file name to clipboardExpand all lines: rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_parent_process.toml
@@ -65,7 +65,7 @@ note = """## Triage and analysis
65
65
> **Disclaimer**:
66
66
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
67
67
68
-
### Investigating Suspicious Windows Process Cluster Spawned by a Parent Process
68
+
### Investigating Parent Process Detected with Suspicious Windows Process(es)
69
69
70
70
In Windows environments, processes are often spawned by parent processes, forming a hierarchy. Adversaries exploit this by using legitimate processes to launch malicious ones, often leveraging Living off the Land Binaries (LOLBins) to evade detection. The detection rule employs machine learning to identify clusters of processes with high malicious probability, focusing on those sharing a common parent process. This approach helps uncover stealthy attacks that traditional methods might miss, enhancing defense against tactics like masquerading.
@@ -65,7 +65,7 @@ note = """## Triage and analysis
65
65
> **Disclaimer**:
66
66
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
67
67
68
-
### Investigating Suspicious Windows Process Cluster Spawned by a User
68
+
### Investigating User Detected with Suspicious Windows Process(es)
69
69
70
70
The detection leverages machine learning to identify clusters of Windows processes with high malicious probability, often linked to tactics like masquerading. Adversaries exploit legitimate tools (LOLBins) to evade detection. This rule uses both supervised and unsupervised ML models to flag unusual process clusters, focusing on user-associated anomalies to uncover potential threats.
0 commit comments