Skip to content

Commit bcd9cf5

Browse files
committed
feat(rules): Add Suspicious protected process execution rule
Identifies unprivileged process spawning a child with protected integrity level. This indicates an unusual behavior that is often associated with attempts to tamper with or freeze endpoint protection components.
1 parent 217b01a commit bcd9cf5

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
name: Suspicious protected process execution
2+
id: a778295a-02f1-42d9-9c20-78346a7bc2c6
3+
version: 1.0.0
4+
description: |
5+
Identifies unprivileged process spawning a child with protected integrity level. This
6+
indicates an unusual behavior that is often associated with attempts to tamper with or
7+
freeze endpoint protection components.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1562
13+
technique.name: Impair Defenses
14+
technique.ref: https://attack.mitre.org/techniques/T1562/
15+
subtechnique.id: T1562.001
16+
subtechnique.name: Disable or Modify Tools
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1562/001
18+
references:
19+
- https://github.com/TwoSevenOneT/EDR-Freeze
20+
21+
condition: >
22+
sequence
23+
maxspan 1m30s
24+
|spawn_process and
25+
ps.token.integrity_level != 'SYSTEM' and
26+
ps.exe not imatches
27+
(
28+
'?:\\Program Files\\*',
29+
'?:\\Program Files(x86)\\*'
30+
)
31+
| by ps.uuid
32+
|spawn_process and ps.is_protected| by ps.parent.uuid
33+
action:
34+
- name: kill
35+
36+
output: >
37+
Suspicious protected process %2.ps.exe spawned by process %2.ps.parent.exe
38+
severity: high
39+
40+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)