title: Windows Shell Spawning Suspicious Program status: experimental description: Detects a suspicious child process of a Windows shell references: - https://mgreen27.github.io/posts/2018/04/02/DownloadCradle.html author: Florian Roth date: 20018/04/06 logsource: product: windows service: sysmon detection: selection: EventID: 1 ParentImage: - '*\mshta.exe' - '*\powershell.exe' - '*\cmd.exe' - '*\rundll32.exe' - '*\cscript.exe' - '*\wscript.exe' - '*\wmiprvse.exe' Image: - '*\schtasks.exe' - '*\nslookup.exe' - '*\certutil.exe' - '*\bitsadmin.exe' condition: selection fields: - CommandLine - ParentCommandLine falsepositives: - Administrative scripts level: medium