Rule Info
Name
Potentially Suspicious Child Process Of VsCode
Author
Nasreddine Bencherchali (Nextron Systems)
Description
Detects uncommon or suspicious child processes spawning from a VsCode "code.exe" process. This could indicate an attempt of persistence via VsCode tasks or terminal profiles.
Date
2023-01-26 00:00:00
Modified
2023-10-25 00:00:00
Id
5a3164f2-b373-4152-93cf-090b13c12d27
Tags
attack.execution attack.defense_evasion attack.t1218 attack.t1202 DEMO
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
citronninja
Merge PR #4463 from @citronninja - Add New Rules Related to VsCode Tunnel Usage & Abuse
2023-10-28