Unusual Windows Process Calling the Metadata Service

edit

Unusual Windows Process Calling the Metadata Service

edit

Looks for anomalous access to the metadata service by an unusual process. The metadata service may be targeted in order to harvest credentials or user data scripts containing secrets.

Rule type: machine_learning

Rule indices: None

Severity: low

Risk score: 21

Runs every: 15m

Searches indices from: now-45m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References: None

Tags:

  • Elastic
  • Host
  • Windows
  • Threat Detection
  • ML
  • Credential Access

Version: 100

Rule authors:

  • Elastic

Rule license: Elastic License v2

Framework: MITRE ATT&CKTM