Suspicious Child Process Of SQL Server
Detects suspicious child processes of the SQLServer process. This could indicate potential RCE or SQL Injection.
Sigma rule (View on GitHub)
1title: Suspicious Child Process Of SQL Server
2id: 869b9ca7-9ea2-4a5a-8325-e80e62f75445
3related:
4 - id: 344482e4-a477-436c-aa70-7536d18a48c7
5 type: obsolete
6status: test
7description: Detects suspicious child processes of the SQLServer process. This could indicate potential RCE or SQL Injection.
8references:
9 - Internal Research
10author: FPT.EagleEye Team, wagga
11date: 2020-12-11
12modified: 2023-05-04
13tags:
14 - attack.t1505.003
15 - attack.t1190
16 - attack.initial-access
17 - attack.persistence
18 - attack.privilege-escalation
19logsource:
20 category: process_creation
21 product: windows
22detection:
23 selection:
24 ParentImage|endswith: '\sqlservr.exe'
25 Image|endswith:
26 # You can add other uncommon or suspicious processes
27 - '\bash.exe'
28 - '\bitsadmin.exe'
29 - '\cmd.exe'
30 - '\netstat.exe'
31 - '\nltest.exe'
32 - '\ping.exe'
33 - '\powershell.exe'
34 - '\pwsh.exe'
35 - '\regsvr32.exe'
36 - '\rundll32.exe'
37 - '\sh.exe'
38 - '\systeminfo.exe'
39 - '\tasklist.exe'
40 - '\wsl.exe'
41 filter_optional_datev:
42 ParentImage|startswith: 'C:\Program Files\Microsoft SQL Server\'
43 ParentImage|endswith: 'DATEV_DBENGINE\MSSQL\Binn\sqlservr.exe'
44 Image: 'C:\Windows\System32\cmd.exe'
45 CommandLine|startswith: '"C:\Windows\system32\cmd.exe" '
46 condition: selection and not 1 of filter_optional_*
47level: high
References
Related rules
- CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Exploit
- Oracle WebLogic Exploit
- Suspicious File Drop by Exchange
- Suspicious MSExchangeMailboxReplication ASPX Write
- Suspicious Processes Spawned by WinRM