Excessive Taskkill Usage for Defense Evasion
Adversaries use taskkill.exe to disable security tools, and this detection identifies instances where taskkill.exe is executed excessively within a short timeframe, indicative of malicious activity aimed at defense evasion.
This brief examines the excessive usage of taskkill.exe, a Windows command-line utility, as an indicator of potential malicious activity. The use of taskkill.exe is a known technique used by attackers to disable security tools or other critical processes to evade detection and maintain persistence on a compromised system. This analytic focuses on detecting instances where taskkill.exe is executed ten or more times within a one-minute span, which is considered an anomalous and suspicious behavior. This detection can identify activity associated with malware families like Azorult, AgentTesla, NjRAT, and XMRig. Successful execution of this technique can allow attackers to bypass security defenses, maintain persistence, and further compromise the system.
Attack Chain
- The attacker gains initial access to the system through an exploit or compromised credentials.
- The attacker executes a script or program designed to disable security tools.
- The script utilizes
taskkill.exeto terminate processes associated with antivirus software, endpoint detection and response (EDR) agents, and other security monitoring tools. taskkill.exeis executed repeatedly within a short timeframe (e.g., 10 or more times in one minute) to ensure the targeted processes are terminated.- With security tools disabled, the attacker can now execute malicious payloads without immediate detection.
- The attacker deploys ransomware, steals sensitive data, or establishes a persistent backdoor on the system.
- The attacker attempts to move laterally to other systems to expand their control within the network.
Impact
Successful exploitation via excessive taskkill usage can lead to significant disruption, data theft, and financial loss. If attackers successfully disable endpoint protection, they can deploy ransomware, steal sensitive data, or pivot to other systems. This impacts the confidentiality, integrity, and availability of the affected systems and data. Organizations in all sectors are at risk.
Recommendation
- Deploy the Sigma rule
Excessive Taskkill Usageto your SIEM to detect rapid taskkill executions and tune for your environment. - Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rule.
- Ensure that Windows Event Log Security Auditing is enabled (Event ID 4688) to capture process creation events.
- Investigate any alerts generated by the Sigma rules, prioritizing those involving privileged accounts or critical systems.
Detection coverage 2
Excessive Taskkill Usage
highDetects excessive usage of taskkill.exe, which is indicative of attackers trying to disable security tools.
Taskkill Usage with Suspicious Parent Process
mediumDetects taskkill.exe being executed from unusual parent processes, which could indicate malicious activity.
Detection queries are kept inside the platform. Get full rules →