Browser Execution In Headless Mode

Detects execution of Chromium based browser in headless mode

Sigma rule (View on GitHub)

 1title: Browser Execution In Headless Mode
 2id: ef9dcfed-690c-4c5d-a9d1-482cd422225c
 3related:
 4    - id: 0e8cfe08-02c9-4815-a2f8-0d157b7ed33e
 5      type: derived
 6status: test
 7description: Detects execution of Chromium based browser in headless mode
 8references:
 9    - https://twitter.com/mrd0x/status/1478234484881436672?s=12
10    - https://www.trendmicro.com/en_us/research/23/e/managed-xdr-investigation-of-ducktail-in-trend-micro-vision-one.html
11author: Nasreddine Bencherchali (Nextron Systems)
12date: 2023-09-12
13tags:
14    - attack.defense-evasion
15    - attack.command-and-control
16    - attack.t1105
17    - attack.t1564.003
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection:
23        Image|endswith:
24            - '\brave.exe'
25            - '\chrome.exe'
26            - '\msedge.exe'
27            - '\opera.exe'
28            - '\vivaldi.exe'
29        CommandLine|contains: '--headless'
30    condition: selection
31falsepositives:
32    - Unknown
33level: low

References

Related rules

to-top