Uncommon Child Process Of Conhost.EXE

Detects uncommon "conhost" child processes. This could be a sign of "conhost" usage as a LOLBIN or potential process injection activity.

Sigma rule (View on GitHub)

 1title: Uncommon Child Process Of Conhost.EXE
 2id: 7dc2dedd-7603-461a-bc13-15803d132355
 3status: experimental
 4description: Detects uncommon "conhost" child processes. This could be a sign of "conhost" usage as a LOLBIN or potential process injection activity.
 5references:
 6    - http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
 7author: omkar72
 8date: 2020/10/25
 9modified: 2023/12/11
10tags:
11    - attack.defense_evasion
12    - attack.t1202
13logsource:
14    category: process_creation
15    product: windows
16detection:
17    selection:
18        ParentImage|endswith: '\conhost.exe'
19    filter_main_conhost:
20        Image|endswith: ':\Windows\System32\conhost.exe'
21    filter_main_null:
22        Image: null
23    filter_main_empty:
24        Image: ''
25    filter_optional_provider:
26        Provider_Name: 'SystemTraceProvider-Process'  # Race condition with SystemTrace doesn't provide all fields.
27    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
28falsepositives:
29    - Unknown
30level: medium

References

Related rules

to-top