Skip to content

Commit dc7053f

Browse files
committed
feat(rules): Suspicious protected process spawned
Identifies when a non-SYSTEM process spawns a protected child process. This indicates an unusual behavior that is often associated with attempts to tamper with or freeze endpoint protection components.
1 parent ee4a3a3 commit dc7053f

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: Suspicious protected process spawned
2+
id: a778295a-02f1-42d9-9c20-78346a7bc2c6
3+
version: 1.0.0
4+
description: |
5+
Identifies when a non-SYSTEM process spawns a protected child process. This indicates an
6+
unusual behavior that is often associated with attempts to tamper with or freeze endpoint
7+
protection components.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1562
13+
technique.name: Impair Defenses
14+
technique.ref: https://attack.mitre.org/techniques/T1562/
15+
subtechnique.id: T1562.001
16+
subtechnique.name: Disable or Modify Tools
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1562/001
18+
references:
19+
- https://github.com/TwoSevenOneT/EDR-Freeze
20+
21+
condition: >
22+
spawn_process and ps.child.is_protected = true and ps.token.integrity_level != 'SYSTEM'
23+
and
24+
pe.cert.issuer not imatches
25+
(
26+
'*Microsoft Windows*',
27+
'*Microsoft Corporation*',
28+
'*CrowdStrike, Inc*',
29+
'*Sentinel Labs, Inc*',
30+
'*SentinelOne Inc*',
31+
'*Sophos Ltd*',
32+
'*Symantec Corporation*',
33+
'*Palo Alto Networks*',
34+
'*Trend Micro, Inc*'
35+
)
36+
action:
37+
- name: kill
38+
39+
output: >
40+
Suspicious protected process %ps.child.exe spawned by non-system process %ps.exe
41+
severity: high
42+
43+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)