EXPLORE
← Back to Explore
sigmalowHunting

Windows Processes Suspicious Parent Directory

Detect suspicious parent processes of well-known Windows processes

MITRE ATT&CK

defense-evasion

Detection Query

selection:
  Image|endswith:
    - \svchost.exe
    - \taskhost.exe
    - \lsm.exe
    - \lsass.exe
    - \services.exe
    - \lsaiso.exe
    - \csrss.exe
    - \wininit.exe
    - \winlogon.exe
filter_sys:
  - ParentImage|endswith:
      - \SavService.exe
      - \ngen.exe
  - ParentImage|contains:
      - \System32\
      - \SysWOW64\
filter_msmpeng:
  ParentImage|contains:
    - \Windows Defender\
    - \Microsoft Security Client\
  ParentImage|endswith: \MsMpEng.exe
filter_null:
  - ParentImage: null
  - ParentImage:
      - ""
      - "-"
condition: selection and not 1 of filter_*

Author

vburov

Created

2019-02-23

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.defense-evasionattack.t1036.003attack.t1036.005
Raw Content
title: Windows Processes Suspicious Parent Directory
id: 96036718-71cc-4027-a538-d1587e0006a7
status: test
description: Detect suspicious parent processes of well-known Windows processes
references:
    - https://web.archive.org/web/20180718061628/https://securitybytes.io/blue-team-fundamentals-part-two-windows-processes-759fe15965e2
    - https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/
    - https://www.13cubed.com/downloads/windows_process_genealogy_v2.pdf
author: vburov
date: 2019-02-23
modified: 2025-03-06
tags:
    - attack.defense-evasion
    - attack.t1036.003
    - attack.t1036.005
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith:
            - '\svchost.exe'
            - '\taskhost.exe'
            - '\lsm.exe'
            - '\lsass.exe'
            - '\services.exe'
            - '\lsaiso.exe'
            - '\csrss.exe'
            - '\wininit.exe'
            - '\winlogon.exe'
    filter_sys:
        - ParentImage|endswith:
              - '\SavService.exe'
              - '\ngen.exe'
        - ParentImage|contains:
              - '\System32\'
              - '\SysWOW64\'
    filter_msmpeng:
        ParentImage|contains:
            - '\Windows Defender\'
            - '\Microsoft Security Client\'
        ParentImage|endswith: '\MsMpEng.exe'
    filter_null:
        - ParentImage: null
        - ParentImage:
              - ''
              - '-'
    condition: selection and not 1 of filter_*
falsepositives:
    - Some security products seem to spawn these
level: low