Process Execution sans Command Lines

Looks for process execution with no command line arguments, which may indicate process injection. Inspired by the 2022 Red Canary Threat Detection report.

Sigma rule (View on GitHub)

 1title: Process Execution sans Command Lines
 2id: e0a2f82f-d11d-4ea7-af7e-a8f760b07c04
 3status: experimental
 4description: Looks for process execution with no command line arguments, which may
 5    indicate process injection. Inspired by the 2022 Red Canary Threat Detection report.
 6references:
 7    - https://redcanary.com/threat-detection-report/techniques/process-injection/
 8author: Micah Babinski
 9date: 2022/11/03
10tags:
11    - attack.privilege_escalation
12    - attack.t1055
13logsource:
14    category: process_creation
15    product: windows
16detection:
17    selection:
18        Image|endswith:
19            - '\backgroundtaskhost.exe'
20            - '\svchost.exe'
21            - '\dllhost.exe'
22            - '\werfault.exe'
23            - '\searchprotocolhost.exe'
24            - '\wuauclt.exe'
25            - '\spoolsv.exe'
26            - '\rundll32.exe'
27            - '\regasm.exe'
28            - '\regsvr32.exe'
29            - '\regsvcs.exe'
30        # looks for command line values ending with exe or exe" and no other characters following
31        CommandLine|re: '^.*\.exe(\s|")*$'
32    condition: selection
33falsepositives:
34    - Unknown
35level: high```

References

Related rules

to-top