Parent in Public Folder Suspicious Process
This rule detects suspicious processes with parent images located in the C:\Users\Public folder
Sigma rule (View on GitHub)
1title: Parent in Public Folder Suspicious Process
2id: 69bd9b97-2be2-41b6-9816-fb08757a4d1a
3status: experimental
4description: This rule detects suspicious processes with parent images located in the C:\Users\Public folder
5references:
6 - https://redcanary.com/blog/blackbyte-ransomware/
7author: Florian Roth (Nextron Systems)
8date: 2022/02/25
9modified: 2022/11/18
10logsource:
11 category: process_creation
12 product: windows
13detection:
14 selection:
15 ParentImage|startswith: 'C:\Users\Public\'
16 CommandLine|contains:
17 - 'powershell'
18 - 'cmd.exe /c '
19 - 'cmd.exe /r '
20 - 'cmd.exe /k '
21 - 'cmd /c '
22 - 'cmd /r '
23 - 'cmd /k '
24 - 'wscript.exe'
25 - 'cscript.exe'
26 - 'bitsadmin'
27 - 'certutil'
28 - 'mshta.exe'
29 condition: selection
30fields:
31 - ComputerName
32 - User
33 - CommandLine
34falsepositives:
35 - Unknown
36level: high