Suspicious Child Process of Notepad++ Updater - GUP.Exe
Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.
Sigma rule (View on GitHub)
1title: Suspicious Child Process of Notepad++ Updater - GUP.Exe
2id: bb0e87ce-c89f-4857-84fa-095e4483e9cb
3status: experimental
4description: |
5 Detects suspicious child process creation by the Notepad++ updater process (gup.exe).
6 This could indicate potential exploitation of the updater component to deliver unwanted malware.
7references:
8 - https://notepad-plus-plus.org/news/v889-released/
9 - https://www.heise.de/en/news/Notepad-updater-installed-malware-11109726.html
10 - https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
11 - https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/
12 - https://securelist.com/notepad-supply-chain-attack/118708/
13author: Swachchhanda Shrawan Poudel (Nextron Systems)
14date: 2026-02-03
15tags:
16 - attack.collection
17 - attack.credential-access
18 - attack.t1195.002
19 - attack.initial-access
20 - attack.t1557
21logsource:
22 category: process_creation
23 product: windows
24detection:
25 selection_parent:
26 ParentImage|endswith: '\gup.exe'
27 selection_child_img:
28 Image|endswith:
29 - '\cmd.exe'
30 - '\powershell.exe'
31 - '\pwsh.exe'
32 - '\cscript.exe'
33 - '\wscript.exe'
34 - '\mshta.exe'
35 selection_child_cli:
36 CommandLine|contains:
37 - 'bitsadmin'
38 - 'certutil'
39 - 'curl'
40 - 'finger'
41 - 'forfiles'
42 - 'regsvr32'
43 - 'rundll32'
44 - 'wget'
45 condition: selection_parent and 1 of selection_child_*
46falsepositives:
47 - Unlikely
48level: high
References
Related rules
- Notepad++ Updater DNS Query to Uncommon Domains
- Uncommon File Created by Notepad++ Updater Gup.EXE
- Cisco BGP Authentication Failures
- Cisco LDP Authentication Failures
- Huawei BGP Authentication Failures