Potentially Suspicious Child Process Of DiskShadow.EXE

Rule Info

Name
Potentially Suspicious Child Process Of DiskShadow.EXE
Author
Nasreddine Bencherchali (Nextron Systems)
Description
Detects potentially suspicious child processes of "Diskshadow.exe". This could be an attempt to bypass parent/child relationship detection or application whitelisting rules.
Date
2023-09-15 00:00:00
Modified
None
Id
9f546b25-5f12-4c8d-8532-5893dcb1e4b8
Tags
attack.defense-evasion attack.t1218
Type
Community Rule

Rule History

Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4942 from @nasbench - promote older rules status from experimental to test
2024-08-01
Qasim Qlf
Merge PR #4718 from @qasimqlf - Update ATT&CK Mapping For Some Rules
2024-02-26
cyb3rjy0t
Merge PR #4405 from @nasbench & @cyb3rjy0t - Update Diskshadow Related Rules
2023-09-15