Detection rules › Sigma
Remote Thread Creation By Uncommon Source Image
Detects uncommon processes creating remote threads.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Privilege Escalation | T1055 Process Injection |
| Defense Evasion | T1055 Process Injection |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 8 | CreateRemoteThread |
Stages and Predicates
Stage 1: selection
or:
SourceImage|endswith: '\explorer.exe'
SourceImage|endswith: '\iexplore.exe'
SourceImage|endswith: '\msiexec.exe'
SourceImage|endswith: '\powerpnt.exe'
SourceImage|endswith: '\schtasks.exe'
SourceImage|endswith: '\winlogon.exe'
Stage 2: not 1 of filter_main_*
or:
SourceImage: ['C:\Windows\SysWOW64\schtasks.exe', 'C:\Windows\System32\schtasks.exe']
TargetImage: 'C:\Windows\System32\conhost.exe'
TargetImage: ['C:\Program Files (x86)\Internet Explorer\iexplore.exe', 'C:\Windows\System32\rundll32.exe']
SourceImage: 'C:\Program Files\Internet Explorer\iexplore.exe'
TargetImage: ['C:\Windows\SysWOW64\msiexec.exe', 'C:\Windows\System32\msiexec.exe']
SourceImage|endswith: '\msiexec.exe'
TargetImage: ['C:\Windows\System32\AtBroker.exe', 'C:\Windows\System32\LogonUI.exe', 'C:\Windows\System32\csrss.exe', 'C:\Windows\System32\dwm.exe', 'C:\Windows\System32\fontdrvhost.exe', 'C:\Windows\System32\services.exe', 'C:\Windows\System32\userinit.exe', 'C:\Windows\System32\wininit.exe', 'C:\Windows\System32\wlrmdr.exe']
SourceImage: 'C:\Windows\System32\winlogon.exe'
or:
TargetImage|contains: 'C:\Program Files (x86)\'
TargetImage|contains: 'C:\Program Files\'
TargetImage|contains: 'C:\Windows\Microsoft.NET\Framework64\'
TargetImage|contains: '\AppData\Local\'
SourceImage|endswith: '\msiexec.exe'
or:
TargetImage|contains: 'C:\Program Files (x86)\Microsoft Office\'
TargetImage|contains: 'C:\Program Files\Microsoft Office\'
SourceImage|endswith: '\POWERPNT.EXE'
or:
TargetImage|startswith: 'C:\Program Files (x86)\'
TargetImage|startswith: 'C:\Program Files\'
TargetImage|startswith: 'C:\Windows\SysWOW64\'
TargetImage|startswith: 'C:\Windows\System32\'
SourceImage: 'C:\Windows\explorer.exe'
SourceImage: 'C:\Windows\System32\winlogon.exe'
TargetParentProcessId: 4
TargetImage: ''
TargetImage: System
TargetImage: null
Stage 3: not 1 of filter_optional_*
or:
or:
SourceParentImage|startswith: 'C:\Program Files (x86)\'
SourceParentImage|startswith: 'C:\Program Files\'
SourceImage: 'C:\Program Files\internet explorer\iexplore.exe'
SourceParentImage|contains: '\CheckPoint\SmartConsole\'
SourceParentImage|contains: '\SmartConsole.exe'
SourceCommandLine|contains: '.checkpoint.com/documents/'
SourceCommandLine|contains: 'SmartConsole_OLH/'
SourceCommandLine|contains: 'default.htm#cshid='
SourceCommandLine|contains: 'https://'
SourceImage: 'C:\Program Files\internet explorer\iexplore.exe'
SourceImage|endswith: '\POWERPNT.EXE'
SourceImage|contains: '\Microsoft Office\'
TargetImage: 'C:\Windows\System32\csrss.exe'
SourceImage: 'C:\Windows\explorer.exe'
TargetImage|endswith: '\AppData\Local\Microsoft\OneDrive\OneDrive.exe'
SourceImage: 'C:\Windows\explorer.exe'
TargetImage|endswith: '\OfficeSetup.exe'
SourceImage: 'C:\Windows\explorer.exe'
TargetImage|endswith: '\aurora-dashboard.exe'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
SourceCommandLine | match |
|
SourceImage | ends_with |
|
SourceImage | eq |
|
SourceImage | match |
|
SourceParentImage | match |
|
SourceParentImage | starts_with |
|
TargetImage | ends_with |
|
TargetImage | eq |
|
TargetImage | match |
|
TargetImage | starts_with |
|
TargetParentProcessId | eq |
|