Skip to content

Commit 603fe53

Browse files
committed
headless_bee
1 parent 5df06bd commit 603fe53

File tree

1 file changed

+77
-0
lines changed

1 file changed

+77
-0
lines changed
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
name: Windows Process File Path in ProgramData
2+
id: 237016fa-d8e6-47b4-80f9-70c4d42c72c0
3+
version: 1
4+
date: '2025-03-13'
5+
author: Teoderick Contreras, Splunk
6+
status: production
7+
type: Anomaly
8+
description: The following analytic identifies processes running from file paths within the ProgramData directory, a common location abused by adversaries for executing malicious code while evading detection. Threat actors often drop and execute payloads from this directory to bypass security controls, as it typically has write permissions for standard users. While this behavior can indicate malware execution or persistence techniques, it is important to note that some legitimate software, installers, and update mechanisms also run from ProgramData, leading to potential false positives. Security teams should validate detections by correlating with other indicators, such as unusual parent processes, unsigned binaries, or anomalous network activity.
9+
data_source:
10+
- Sysmon EventID 1
11+
- Windows Event Log Security 4688
12+
- CrowdStrike ProcessRollup2
13+
search: '| tstats `security_content_summariesonly` count values(Processes.process_name)
14+
as process_name values(Processes.process) as process min(_time) as firstTime max(_time)
15+
as lastTime from datamodel=Endpoint.Processes
16+
where Processes.process_path = "*:\\programdata\\*"
17+
by Processes.parent_process_name Processes.parent_process Processes.process_path Processes.dest Processes.user
18+
| `drop_dm_object_name(Processes)`
19+
| `security_content_ctime(firstTime)`
20+
| `security_content_ctime(lastTime)`
21+
| `windows_process_file_path_in_programdata_filter`'
22+
how_to_implement: The detection is based on data that originates from Endpoint Detection
23+
and Response (EDR) agents. These agents are designed to provide security-related
24+
telemetry from the endpoints where the agent is installed. To implement this search,
25+
you must ingest logs that contain the process GUID, process name, and parent process.
26+
Additionally, you must ingest complete command-line executions. These logs must
27+
be processed using the appropriate Splunk Technology Add-ons that are specific to
28+
the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint`
29+
data model. Use the Splunk Common Information Model (CIM) to normalize the field
30+
names and speed up the data modeling process.
31+
known_false_positives: Administrators may allow execution of specific binaries in
32+
non-standard paths. Filter as needed.
33+
references:
34+
- https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
35+
drilldown_searches:
36+
- name: View the detection results for - "$dest$"
37+
search: '%original_detection_search% | search dest = "$dest$"'
38+
earliest_offset: $info_min_time$
39+
latest_offset: $info_max_time$
40+
- name: View risk events for the last 7 days for - "$dest$"
41+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
42+
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
43+
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
44+
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
45+
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
46+
| `security_content_ctime(lastTime)`'
47+
earliest_offset: $info_min_time$
48+
latest_offset: $info_max_time$
49+
rba:
50+
message: Suspicious process $process_name$ running from a process path-
51+
$process_path$ on host- $dest$
52+
risk_objects:
53+
- field: dest
54+
type: system
55+
score: 25
56+
threat_objects:
57+
- field: parent_process_name
58+
type: parent_process_name
59+
tags:
60+
analytic_story:
61+
- China-Nexus Threat Activity
62+
- Earth Estries
63+
- SnappyBee
64+
asset_type: Endpoint
65+
mitre_attack_id:
66+
- T1036.005
67+
product:
68+
- Splunk Enterprise
69+
- Splunk Enterprise Security
70+
- Splunk Cloud
71+
security_domain: endpoint
72+
tests:
73+
- name: True Positive Test
74+
attack_data:
75+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1036.005/process_in_programdata/exec_programdata.log
76+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
77+
sourcetype: XmlWinEventLog

0 commit comments

Comments
 (0)