Potentially Suspicious GoogleUpdate Child Process

Detects potentially suspicious child processes of "GoogleUpdate.exe"

Sigma rule (View on GitHub)

 1title: Potentially Suspicious GoogleUpdate Child Process
 2id: 84b1ecf9-6eff-4004-bafb-bae5c0e251b2
 3related:
 4    - id: bdbab15a-3826-48fa-a1b7-723cd8f32fcc
 5      type: derived
 6status: test
 7description: Detects potentially suspicious child processes of "GoogleUpdate.exe"
 8references:
 9    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/goofy-guineapig/NCSC-MAR-Goofy-Guineapig.pdf
10author: Nasreddine Bencherchali (Nextron Systems)
11date: 2023/05/15
12modified: 2023/05/22
13tags:
14    - attack.defense_evasion
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection:
20        ParentImage|endswith: '\GoogleUpdate.exe'
21    filter_main_known_legit:
22        # Some other legit child process might exist. It's better to make a baseline before running this in production
23        - Image|contains: '\Google' # Example: GoogleUpdate.exe, GoogleCrashHandler.exe, GoogleUpdateComRegisterShell64.exe
24        - Image|endswith:
25              - '\setup.exe'
26              - 'chrome_updater.exe'
27              - 'chrome_installer.exe'
28    filter_main_image_null:
29        Image: null
30    condition: selection and not 1 of filter_main_*
31falsepositives:
32    - Unknown
33level: high

References

Related rules

to-top