Detection rules › Sigma
Suspicious SYSTEM User Process Creation
Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Privilege Escalation | T1134 Access Token Manipulation |
| Defense Evasion | T1027 Obfuscated Files or Information, T1134 Access Token Manipulation |
| Credential Access | T1003 OS Credential Dumping |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: all of selection
IntegrityLevel: [S-1-16-16384, System]
or:
User|contains: AUTHORI
User|contains: AUTORI
Stage 2: all of selection_special
or:
CommandLine|contains: ' -NoP '
CommandLine|contains: ' -W Hidden '
CommandLine|contains: ' -decode '
CommandLine|contains: ' -e* IAB'
CommandLine|contains: ' -e* JAB'
CommandLine|contains: ' -e* PAA'
CommandLine|contains: ' -e* SQBFAFgA'
CommandLine|contains: ' -e* SUVYI'
CommandLine|contains: ' -e* aQBlAHgA'
CommandLine|contains: ' -e* aWV4I'
CommandLine|contains: ' -ma '
CommandLine|contains: ' -urlcache '
CommandLine|contains: ' /decode '
CommandLine|contains: ' /ticket:'
CommandLine|contains: ' /urlcache '
CommandLine|contains: ' p::d '
CommandLine|contains: '.downloadfile('
CommandLine|contains: '.downloadstring('
CommandLine|contains: ';iex('
CommandLine|contains: 'Microsoft\Windows\CurrentVersion\Run'
CommandLine|contains: MiniDump
CommandLine|contains: 'dpapi::'
CommandLine|contains: 'event::clear'
CommandLine|contains: 'event::drop'
CommandLine|contains: 'id::modify'
CommandLine|contains: 'kerberos::'
CommandLine|contains: 'lsadump::'
CommandLine|contains: 'misc::'
CommandLine|contains: 'privilege::'
CommandLine|contains: 'reg SAVE HKLM'
CommandLine|contains: 'rpc::'
CommandLine|contains: 'sekurlsa::'
CommandLine|contains: 'sid::'
CommandLine|contains: 'token::'
CommandLine|contains: 'vault::cred'
CommandLine|contains: 'vault::list'
CommandLine|contains: 'vssadmin delete shadows'
CommandLine|re: 'net\s+user\s+'
Image|endswith: '\calc.exe'
Image|endswith: '\cscript.exe'
Image|endswith: '\forfiles.exe'
Image|endswith: '\hh.exe'
Image|endswith: '\mshta.exe'
Image|endswith: '\ping.exe'
Image|endswith: '\wscript.exe'
Stage 3: not 1 of filter_*
or:
or:
Image|contains: ':\Program Files (x86)\Java\'
Image|contains: ':\Program Files\Java\'
or:
ParentImage|contains: ':\Program Files (x86)\Java\'
ParentImage|contains: ':\Program Files\Java\'
CommandLine|contains: ' -ma '
Image|endswith: '\bin\jp2launcher.exe'
ParentImage|endswith: '\bin\javaws.exe'
CommandLine|contains: ' -n '
CommandLine|contains: 127.0.0.1
CommandLine|contains: ping
Image|endswith: '\PING.EXE'
ParentCommandLine|contains: '\DismFoDInstall.cmd'
ParentImage|contains: ':\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows\'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
CommandLine | regex_match |
|
Image | ends_with |
|
Image | match |
|
IntegrityLevel | eq |
|
ParentCommandLine | match |
|
ParentImage | ends_with |
|
ParentImage | match |
|
User | match |
|
Neighbors
Stricter alternatives (narrower than this rule)
The rules below may be useful if you find the current rule is too noisy / lacks specificity.
- Suspicious Child Process Created as System (adds 3 filters)