Machine Learning Detected a Suspicious Windows Event Predicted to be Malicious Activity

A supervised machine learning model (ProblemChild) has identified a suspicious Windows process event with high probability of it being malicious activity. Alternatively, the model's blocklist identified the event as being malicious.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2023/10/16"
 3integration = ["problemchild","endpoint"]
 4maturity = "production"
 5min_stack_comments = "LotL package job ID and rule removal updates"
 6min_stack_version = "8.9.0"
 7updated_date = "2023/10/16"
 8
 9[rule]
10author = ["Elastic"]
11description = """
12A supervised machine learning model (ProblemChild) has identified a suspicious Windows process event with high
13probability of it being malicious activity. Alternatively, the model's blocklist identified the event as being
14malicious.
15"""
16from = "now-10m"
17index = ["endgame-*", "logs-endpoint.events.process-*", "winlogbeat-*"]
18language = "eql"
19license = "Elastic License v2"
20name = "Machine Learning Detected a Suspicious Windows Event Predicted to be Malicious Activity"
21note = """## Setup
22
23The Living-off-the-Land (LotL) Detection integration must be enabled and related ML jobs configured for this rule to be effective. Please refer to this rule's references for more information.
24"""
25references = [
26    "https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
27    "https://docs.elastic.co/en/integrations/problemchild",
28    "https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration"
29]
30risk_score = 21
31rule_id = "13e908b9-7bf0-4235-abc9-b5deb500d0ad"
32severity = "low"
33tags = [
34    "OS: Windows",
35    "Data Source: Elastic Endgame",
36    "Use Case: Living off the Land Attack Detection",
37    "Rule Type: ML",
38    "Rule Type: Machine Learning",
39    "Tactic: Defense Evasion",
40]
41timestamp_override = "event.ingested"
42type = "eql"
43
44query = '''
45process where (problemchild.prediction == 1 or blocklist_label == 1) and not process.args : ("*C:\\WINDOWS\\temp\\nessus_*.txt*", "*C:\\WINDOWS\\temp\\nessus_*.tmp*")
46'''
47
48
49[[rule.threat]]
50framework = "MITRE ATT&CK"
51[[rule.threat.technique]]
52id = "T1036"
53name = "Masquerading"
54reference = "https://attack.mitre.org/techniques/T1036/"
55[[rule.threat.technique.subtechnique]]
56id = "T1036.004"
57name = "Masquerade Task or Service"
58reference = "https://attack.mitre.org/techniques/T1036/004/"
59
60
61
62[rule.threat.tactic]
63id = "TA0005"
64name = "Defense Evasion"
65reference = "https://attack.mitre.org/tactics/TA0005/"

Setup

The Living-off-the-Land (LotL) Detection integration must be enabled and related ML jobs configured for this rule to be effective. Please refer to this rule's references for more information.

References

Related rules

to-top