Detection rules › Sigma

Unusual Child Process of dns.exe

Severity
high
Author
Tim Rauch, Elastic (idea)
Source
upstream

Detects an unexpected process spawning from dns.exe which may indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1133 External Remote Services
PersistenceT1133 External Remote Services

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection

ParentImage|endswith: '\dns.exe'

Stage 2: not filter

Image|endswith: '\conhost.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Imageends_with
  • \conhost.exe corpus 7 (sigma 7)
ParentImageends_with
  • \dns.exe