Skip to content

[New Rule] Suspicious Elastic Endpoint Parent Process #213

@Samirbous

Description

@Samirbous

Description

Masquerading as Elastic Endpoint Processes is a defense option (e.g. via Process Hollowing or RunPE where binary path and file system details are identical) that may bring some behavior detection or prevention advantages to an attacker. This rule looks for suspicious parent processes.

image

Required Info

  • Eventing Sources:
  • Target Operating Systems:
  • Platforms
  • Target ECS Version: x.x.x
  • New fields required in ECS for this?
  • Related issues or PRs

Optional Info

  • References:

Example Data

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions