32 lines
984 B
YAML
32 lines
984 B
YAML
title: Suspicious Sysmon as Execution Parent
|
|
id: 6d1058a4-407e-4f3a-a144-1968c11dc5c3
|
|
status: experimental
|
|
description: Detects suspicious process executions in which Sysmon itself is the parent of a process, which could be a sign of exploitation (e.g. CVE-2022-41120)
|
|
references:
|
|
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120
|
|
- https://twitter.com/filip_dragovic/status/1590052248260055041
|
|
- https://twitter.com/filip_dragovic/status/1590104354727436290
|
|
author: Florian Roth
|
|
date: 2022/11/10
|
|
tag:
|
|
- attack.privilege_escalation
|
|
- attack.t1068
|
|
- cve.2022.41120
|
|
logsource:
|
|
product: windows
|
|
category: process_creation
|
|
detection:
|
|
selection:
|
|
ParentImage|endswith:
|
|
- '\Sysmon.exe'
|
|
- '\Sysmon64.exe'
|
|
filter:
|
|
Image:
|
|
- 'C:\Windows\Sysmon64.exe'
|
|
- 'C:\Windows\System32\conhost.exe'
|
|
condition: selection and not filter
|
|
falsepositives:
|
|
- Unknown
|
|
level: high
|
|
|