Suspicious Managed Code Hosting Process

edit

Identifies a suspicious managed code hosting process which could indicate code injection or other form of suspicious code execution.

Rule type: eql

Rule indices:

  • winlogbeat-*
  • logs-endpoint.events.*
  • logs-windows.*

Severity: high

Risk score: 73

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References:

Tags:

  • Elastic
  • Host
  • Windows
  • Threat Detection
  • Defense Evasion

Version: 6 (version history)

Added (Elastic Stack release): 7.10.0

Last modified (Elastic Stack release): 8.4.0

Rule authors: Elastic

Rule license: Elastic License v2

Rule query

edit
sequence by process.entity_id with maxspan=5m [process where
event.type == "start" and process.name : ("wscript.exe",
"cscript.exe", "mshta.exe", "wmic.exe", "regsvr32.exe", "svchost.exe",
"dllhost.exe", "cmstp.exe")] [file where event.type != "deletion" and
file.name : ("wscript.exe.log", "cscript.exe",
"mshta.exe.log", "wmic.exe.log",
"svchost.exe.log", "dllhost.exe.log",
"cmstp.exe.log", "regsvr32.exe.log")]

Threat mapping

edit

Framework: MITRE ATT&CKTM

Rule version history

edit
Version 6 (8.4.0 release)
  • Formatting only
Version 5 (8.2.0 release)
  • Formatting only
Version 4 (7.13.0 release)
  • Updated query, changed from:

    event.category:file and not event.type:deletion and
    file.name:(wscript.exe.log or mshta.exe.log or wscript.exe.log or
    wmic.exe.log or svchost.exe.log or dllhost.exe.log or cmstp.exe.log or
    regsvr32.exe.log)
Version 3 (7.12.0 release)
  • Formatting only
Version 2 (7.11.2 release)
  • Formatting only