Skip to content

Commit 2d33679

Browse files
committed
headless_bee
1 parent bd04197 commit 2d33679

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

detections/endpoint/windows_svchost_exe_parent_process_anomaly.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ description: The following analytic detects an anomaly where a svchost.exe proce
99
data_source:
1010
- Sysmon EventID 1
1111
- Windows Event Log Security 4688
12-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.parent_process_name != "services.exe" AND Processes.process_name = "svchost.exe" AND Processes.process != unknown
12+
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes
13+
where Processes.parent_process_name != "services.exe" AND Processes.process_name = "svchost.exe" AND Processes.process != unknown
1314
by Processes.parent_process_name Processes.parent_process_path Processes.parent_process Processes.process_path Processes.process Processes.original_file_name Processes.dest Processes.user
1415
| `drop_dm_object_name(Processes)`
1516
| `security_content_ctime(firstTime)`

0 commit comments

Comments
 (0)