Detection rules › Sigma

Uncommon Svchost Command Line Parameter

Severity
high
Author
Liran Ravich
Source
upstream

Detects instances of svchost.exe running with an unusual or uncommon command line parameter by excluding known legitimate or common patterns. This could point at a file masquerading as svchost, a process injection, or hollowing of a legitimate svchost instance.

MITRE ATT&CK coverage

TacticTechniques
Privilege EscalationT1055 Process Injection, T1055.012 Process Injection: Process Hollowing
Defense EvasionT1036.005 Masquerading: Match Legitimate Resource Name or Location, T1055 Process Injection, T1055.012 Process Injection: Process Hollowing

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection

Image|endswith: '\svchost.exe'

Stage 2: not 1 of filter_main_*

or:
CommandLine: ''
CommandLine: null
CommandLine|re: '-k\s\w{1,64}(\s?(-p|-s))?'

Stage 3: not 1 of filter_optional_*

or:
CommandLine: svchost.exe
ParentImage|endswith: '\MRT.exe'
CommandLine|contains: svchost.exe
ParentImage|endswith: '\MsMpEng.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLineeq
  • svchost.exe
CommandLinematch
  • svchost.exe
CommandLineregex_match
  • -k\s\w{1,64}(\s?(-p|-s))?
Imageends_with
  • \svchost.exe corpus 20 (sigma 20)
ParentImageends_with
  • \MRT.exe
  • \MsMpEng.exe corpus 3 (sigma 3)

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.