Skip to content

Latest commit

 

History

History
36 lines (25 loc) · 1.36 KB

createremotethread_by_source_process_with_low_occurrence.md

File metadata and controls

36 lines (25 loc) · 1.36 KB

Low Occurrence Rate of CreateRemoteThread by Source Process


Metadata

  • Author: Elastic
  • Description: This hunt attempts to identify remote process injection by aggregating Sysmon CreateRemoteThread events by source process and returns the ones that we observed in only one unique host.
  • UUID: 4f878255-53b8-4914-9a7d-4b668bd2ea6a
  • Integration: windows
  • Language: [ES|QL]
  • Source File: Low Occurrence Rate of CreateRemoteThread by Source Process

Query

from logs-windows.sysmon_operational-*
| where @timestamp > now() - 7 day
| where host.os.family == "windows" and event.category == "process" and event.action == "CreateRemoteThread"
| eval source_process = replace(process.executable, """[cC]:\\[uU][sS][eE][rR][sS]\\[a-zA-Z0-9ñ\.\-\_\$~ ]+\\""", "C:\\\\users\\\\user\\\\")
| stats cc = count(*), hosts = count_distinct(host.id) by source_process
 /* unique source and target processes combined and observed in 1 host */
| where hosts == 1 and cc == 1

Notes

  • Adding winlog.event_data.TargetImage to the aggregation clause can be beneficial but may introduce more false-positives.

MITRE ATT&CK Techniques

License

  • Elastic License v2