Skip to content
Threat Feed
medium advisory

Suspicious Endpoint Security Parent Process Detected

This rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.

This detection identifies potentially malicious attempts to evade endpoint security solutions by monitoring the parent processes of security executables. Adversaries may employ process hollowing or other code injection techniques to inject malicious code into legitimate processes, such as esensor.exe or elastic-endpoint.exe, to avoid detection. The rule flags unexpected parent processes based on deviations from expected behavior, excluding known benign paths and arguments to minimize false positives. This activity is important for defenders as successful evasion can lead to significant compromise of systems and data. The rule supports various data sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon, providing broad coverage across different security ecosystems.

Attack Chain

  1. An attacker gains initial access to the system through an unknown vector.
  2. The attacker attempts to inject malicious code into a legitimate endpoint security process (esensor.exe or elastic-endpoint.exe).
  3. The malicious code is injected using process hollowing or similar techniques.
  4. The endpoint security process is launched by a suspicious parent process outside of known legitimate paths (e.g., not in C:\Program Files\Elastic\* or C:\Windows\System32\*).
  5. The injected code executes within the context of the endpoint security process, potentially disabling or bypassing security controls.
  6. The attacker leverages the compromised endpoint security process to perform further malicious activities, such as lateral movement or data exfiltration.
  7. The endpoint security solution’s ability to detect and respond to threats is impaired, allowing the attacker to operate undetected.

Impact

Successful exploitation via process injection can lead to a significant degradation of endpoint security posture. Attackers can disable or bypass security controls, allowing them to perform malicious activities such as data theft, ransomware deployment, or lateral movement undetected. The impact can range from individual system compromise to widespread network breaches, depending on the scope of the attack.

Recommendation

  • Deploy the Sigma rule Suspicious Endpoint Security Parent Process to your SIEM to detect anomalous parent-child process relationships involving endpoint security executables.
  • Enable Sysmon process creation logging (Event ID 1) to provide detailed process execution data for the Sigma rule.
  • Investigate any alerts generated by the Sigma rule by reviewing the parent process executable path, command-line arguments, and historical activity.
  • Add legitimate but unusual parent process paths to the Sigma rule’s exclusion list to reduce false positives, as described in the rule’s False positive analysis section.
  • Correlate alerts from this rule with other security events from data sources like Elastic Endgame, Microsoft Defender XDR, or Sysmon, as recommended in the rule’s Possible investigation steps section.

Detection coverage 2

Suspicious Endpoint Security Parent Process

medium

Detects endpoint security processes (esensor.exe, elastic-endpoint.exe) launched by unexpected parent processes, potentially indicating process hollowing or code injection.

sigma tactics: defense_evasion techniques: T1036, T1036.005, T1055, T1055.012 sources: process_creation, windows

Suspicious Endpoint Security Parent Process - WerFault

low

Detects endpoint security processes launched by WerFault, excluding expected scenarios.

sigma tactics: defense_evasion techniques: T1036, T1036.005, T1055, T1055.012 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →