Detection of Taskkill Command to Terminate Browser Processes
This analytic detects the use of the taskkill command to terminate known browser processes, a technique employed by malware such as Braodo stealer to steal credentials by forcefully closing browsers like Chrome, Edge, and Firefox to unlock files containing sensitive information.
This detection identifies the use of taskkill.exe to terminate several known browser processes. This technique is often employed by malware, such as the Braodo stealer, to steal credentials. By forcefully closing browsers like Chrome, Edge, and Firefox, the malware can unlock files that store sensitive information, such as passwords and login data. The detection focuses on identifying taskkill commands targeting these browsers, which indicates potentially malicious intent. Early detection allows security teams to investigate and prevent further credential theft and system compromise. This behavior has been observed in malware campaigns originating from Vietnam, targeting credentials for fraud and dropshipping operations.
Attack Chain
- A malicious process is initiated on the system, often through social engineering or exploitation of a vulnerability.
- The malicious process executes
taskkill.exewith specific arguments targeting browser processes. taskkill.exeattempts to terminate processes namedchrome.exe,firefox.exe,brave.exe,opera.exe,msedge.exe, orchromium.exe.- If successful, the browser processes are terminated abruptly.
- The malware gains access to browser data files, which are normally locked while the browsers are running.
- The malware extracts sensitive data from these files, such as usernames, passwords, and cookies.
- The stolen credentials are used for unauthorized access to accounts or services.
- The attacker exfiltrates the stolen data to a remote server for further malicious activity.
Impact
Successful execution of this attack chain leads to the theft of sensitive credentials stored by web browsers. This can result in unauthorized access to user accounts, financial fraud, and identity theft. Victims may experience significant financial losses and reputational damage. The technique is used by malware such as Braodo stealer, which is known to target credentials for fraud and dropshipping operations.
Recommendation
- Deploy the Sigma rule
Detect Taskkill Browser Process Terminationto your SIEM and tune for your environment. - Enable Sysmon EventID 1 logging to capture process creation events, a requirement for the Sigma rule.
- Investigate any instances of
taskkill.exebeing used to terminate browser processes, as identified by the Sigma rule. - Monitor endpoint processes for unusual behavior, particularly processes attempting to access browser data files.
Detection coverage 2
Detect Taskkill Browser Process Termination
highDetects the use of taskkill.exe to terminate common web browser processes, potentially indicating credential theft attempts.
Detect Parent Process Taskkill Browser Termination
mediumDetects parent process that triggers taskkill.exe to terminate common web browser processes, potentially indicating credential theft attempts.
Detection queries are kept inside the platform. Get full rules →