title: Suspect Svchost Memory Asccess id: 166e9c50-8cd9-44af-815d-d1f0c0e90dde status: experimental description: Detects suspect access to svchost process memory such as that used by Invoke-Phantom to kill the winRM windows event logging service. references: - https://github.com/hlldz/Invoke-Phant0m - https://twitter.com/timbmsft/status/900724491076214784 author: Tim Burrell date: 2020/01/02 modified: 2022/11/01 tags: - attack.defense_evasion - attack.t1562.002 logsource: category: process_access product: windows detection: selection: TargetImage|endswith: '\WINDOWS\System32\svchost.exe' GrantedAccess: '0x1F3FFF' CallTrace|contains: 'UNKNOWN' filter_msbuild: SourceImage|startswith: 'C:\Program Files\Microsoft Visual Studio\' SourceImage|endswith: '\MSBuild\Current\Bin\MSBuild.exe' # Just to make sure it's "really" .NET :) CallTrace|contains: - 'Microsoft.Build.ni.dll' - 'System.ni.dll' condition: selection and not 1 of filter_* falsepositives: - Unknown level: high