Suspicious Process Masquerading As SvcHost.EXE

Rule Info

Name
Suspicious Process Masquerading As SvcHost.EXE
Author
Swachchhanda Shrawan Poudel
Description
Detects a suspicious process that is masquerading as the legitimate "svchost.exe" by naming its binary "svchost.exe" and executing from an uncommon location. Adversaries often disguise their malicious binaries by naming them after legitimate system processes like "svchost.exe" to evade detection.
Date
2024-08-07 00:00:00
Modified
None
Id
be58d2e2-06c8-4f58-b666-b99f6dc3b6cd
Tags
attack.defense-evasion attack.t1036.005 DEMO
Type
Community Rule

Rule History

Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
Swachchhanda Shrawan Poudel
Merge PR #4946 from @swachchhanda000 - Add `Suspicious Process Masquerading As SvcHost.EXE`
2024-08-07