diff --git a/rules/windows/process_creation/proc_creation_win_sndvol_susp_child_processes.yml b/rules/windows/process_creation/proc_creation_win_sndvol_susp_child_processes.yml new file mode 100644 index 000000000..993df932e --- /dev/null +++ b/rules/windows/process_creation/proc_creation_win_sndvol_susp_child_processes.yml @@ -0,0 +1,23 @@ +title: Uncommon Child Processes Of SndVol.exe +id: ba42babc-0666-4393-a4f7-ceaf5a69191e +status: experimental +description: Detects potentially uncommon child processes of SndVol.exe (the Windows volume mixer) +references: + - https://twitter.com/Max_Mal_/status/1661322732456353792 +author: X__Junior (Nextron Systems) +date: 2023/06/09 +tags: + - attack.execution +logsource: + product: windows + category: process_creation +detection: + selection: + ParentImage|endswith: '\SndVol.exe' + filter_main_rundll32: + Image|endswith: '\rundll32.exe' + CommandLine|contains: ' shell32.dll,Control_RunDLL ' + condition: selection and not 1 of filter_main_* +falsepositives: + - Unknown +level: medium