Skip to content

Commit 25c5855

Browse files
committed
feat(rules): Add Suspicious child process integrity level rule
Identifies the execution of the parent process running with low/medium integrity level that spawns a child process with the system integrity level. Because normal user-mode applications at lower integrity levels rarely legitimately create new processes running with SYSTEM privileges, this pattern is a strong indicator of privilege escalation or token manipulation where an attacker abuses a privileged token to execute code.
1 parent 9635329 commit 25c5855

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
name: Suspicious child process integrity level
2+
id: b958e949-a16a-4d66-b008-15f4e8382a6e
3+
version: 1.0.0
4+
description: |
5+
Identifies the execution of the parent process running with low/medium integrity
6+
level that spawns a child process with the system integrity level. Because normal
7+
user-mode applications at lower integrity levels rarely legitimately create new
8+
processes running with SYSTEM privileges, this pattern is a strong indicator of
9+
privilege escalation or token manipulation where an attacker abuses a privileged
10+
token to execute code.
11+
labels:
12+
tactic.id: TA0004
13+
tactic.name: Privilege Escalation
14+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
15+
technique.id: T1134
16+
technique.name: Access Token Manipulation
17+
technique.ref: https://attack.mitre.org/techniques/T1134/
18+
subtechnique.id: T1134.002
19+
subtechnique.name: Create Process with Token
20+
subtechnique.ref: https://attack.mitre.org/techniques/T1134/002/
21+
22+
condition: >
23+
sequence
24+
maxspan 8m
25+
|spawn_process and ps.token.integrity_level in ('LOW', 'MEDIUM')| by ps.uuid
26+
|spawn_process and
27+
ps.sid = 'S-1-5-18' and
28+
ps.token.integrity_level = 'SYSTEM' and
29+
ps.exe not imatches
30+
(
31+
'?:\\Windows\\System32\\wermgr.exe',
32+
'?:\\Windows\\System32\\WerFault.exe',
33+
'?:\\Windows\\SysWOW64\\WerFault.exe',
34+
'?:\\Windows\\System32\\WerFaultSecure.exe'
35+
)
36+
| by ps.parent.uuid
37+
action:
38+
- name: kill
39+
40+
output: >
41+
Suspicious process %1.ps.exe spawned the process %2.ps.exe with System integrity level
42+
severity: critical
43+
44+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)