Detection rules › Sigma
Rare Remote Thread Creation By Uncommon Source Image
Detects uncommon processes creating remote threads.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Privilege Escalation | T1055 Process Injection |
| Defense Evasion | T1055 Process Injection |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 8 | CreateRemoteThread |
Stages and Predicates
Stage 1: selection
or:
SourceImage|endswith: '\bash.exe'
SourceImage|endswith: '\cscript.exe'
SourceImage|endswith: '\cvtres.exe'
SourceImage|endswith: '\defrag.exe'
SourceImage|endswith: '\dialer.exe'
SourceImage|endswith: '\dnx.exe'
SourceImage|endswith: '\esentutl.exe'
SourceImage|endswith: '\excel.exe'
SourceImage|endswith: '\expand.exe'
SourceImage|endswith: '\find.exe'
SourceImage|endswith: '\findstr.exe'
SourceImage|endswith: '\forfiles.exe'
SourceImage|endswith: '\gpupdate.exe'
SourceImage|endswith: '\hh.exe'
SourceImage|endswith: '\installutil.exe'
SourceImage|endswith: '\lync.exe'
SourceImage|endswith: '\mDNSResponder.exe'
SourceImage|endswith: '\makecab.exe'
SourceImage|endswith: '\monitoringhost.exe'
SourceImage|endswith: '\msbuild.exe'
SourceImage|endswith: '\mshta.exe'
SourceImage|endswith: '\mspaint.exe'
SourceImage|endswith: '\outlook.exe'
SourceImage|endswith: '\ping.exe'
SourceImage|endswith: '\provtool.exe'
SourceImage|endswith: '\python.exe'
SourceImage|endswith: '\regsvr32.exe'
SourceImage|endswith: '\robocopy.exe'
SourceImage|endswith: '\runonce.exe'
SourceImage|endswith: '\sapcimc.exe'
SourceImage|endswith: '\smartscreen.exe'
SourceImage|endswith: '\spoolsv.exe'
SourceImage|endswith: '\tstheme.exe'
SourceImage|endswith: '\userinit.exe'
SourceImage|endswith: '\vssadmin.exe'
SourceImage|endswith: '\vssvc.exe'
SourceImage|endswith: '\w3wp.exe'
SourceImage|endswith: '\winscp.exe'
SourceImage|endswith: '\winword.exe'
SourceImage|endswith: '\wmic.exe'
SourceImage|endswith: '\wscript.exe'
Stage 2: not 1 of filter_main_*
or:
SourceImage: ['C:\Windows\System32\Defrag.exe', 'C:\Windows\System32\makecab.exe']
TargetImage: 'C:\Windows\System32\conhost.exe'
or:
SourceImage|startswith: 'C:\Program Files (x86)\Microsoft Office\'
SourceImage|startswith: 'C:\Program Files\Microsoft Office\'
TargetImage: System
or:
TargetImage|startswith: 'C:\Program Files (x86)\'
TargetImage|startswith: 'C:\Program Files\'
SourceImage|endswith: '\WINWORD.EXE'
SourceImage: 'C:\Windows\System32\provtool.exe'
TargetImage: 'C:\Windows\System32\svchost.exe'
SourceImage: 'C:\Windows\System32\provtool.exe'
TargetImage: System
SourceImage: 'C:\Windows\System32\userinit.exe'
TargetImage: 'C:\Windows\explorer.exe'
Stage 3: not 1 of filter_optional_explorer_vmtools
TargetImage: ['C:\Program Files (x86)\VMware\VMware Tools\vmtoolsd.exe', 'C:\Program Files\VMware\VMware Tools\vmtoolsd.exe']
SourceImage|endswith: '\SysWOW64\explorer.exe'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
SourceImage | ends_with |
|
SourceImage | eq |
|
SourceImage | starts_with |
|
TargetImage | eq |
|
TargetImage | starts_with |
|