Skip to content
Threat Feed
low advisory

Unusual Process Spawned by a User Detected by Machine Learning

A machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.

A machine learning (ML) rule has identified unusual process execution on a Windows endpoint. This detection leverages two ML models from the Elastic ProblemChild integration: a supervised model that predicts malicious processes and an unsupervised model that identifies processes anomalous to the user’s typical behavior. The rule focuses on detecting defense evasion tactics, specifically the potential use of Living-off-the-Land Binaries (LOLbins) or masquerading techniques, which can be difficult to detect with traditional signature-based methods. This detection uses data from the Elastic Endpoint or Winlogbeat and requires the Living off the Land (LotL) Attack Detection integration assets to be installed. This rule was last updated April 1, 2026 and requires Elastic Stack version 9.4.0 or higher.

Attack Chain

  1. Initial Access: The attacker gains initial access through an existing user account.
  2. Execution: The attacker executes a standard Windows process (e.g., cmd.exe, powershell.exe).
  3. Defense Evasion: The attacker leverages LOLbins to perform malicious actions, blending in with legitimate system activity.
  4. Masquerading: The attacker renames or moves malicious tools to mimic legitimate system files.
  5. Privilege Escalation (Optional): The attacker attempts to escalate privileges using the compromised process.
  6. Lateral Movement (Optional): The attacker uses the compromised process to move laterally to other systems.
  7. Command and Control (Optional): The process establishes a connection to a command and control server for further instructions.
  8. Impact: The attacker achieves their objective, such as data exfiltration, system compromise, or persistence.

Impact

A successful attack using these techniques can lead to a full system compromise, data theft, or the installation of persistent backdoors. The use of LOLbins makes detection difficult, potentially allowing attackers to operate undetected for extended periods. The impact is amplified by the potential for lateral movement to other systems within the network. While the severity is rated “low”, successful exploitation allows attackers to move laterally and establish persistence in the network.

Recommendation

  • Ensure the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as detailed in the rule setup (Elastic Defend or Winlogbeat).
  • Investigate alerts generated by the “Unusual Process Spawned by a User” rule (rule_id: 40155ee4-1e6a-4e4d-a63b-e8ba16980cfb) to determine the legitimacy of the flagged process.
  • Tune the anomaly threshold (anomaly_threshold: 75) based on your environment to reduce false positives, as mentioned in the rule parameters.
  • Review the “False positive analysis” section in the rule’s note for guidance on identifying and excluding legitimate processes.
  • Implement the provided Sigma rule to detect unusual command line arguments associated with LOLBins.

Detection coverage 2

Detect LOLBins via Command Line Arguments

medium

Detects potential LOLBins usage through command-line arguments often used in malicious activities.

sigma tactics: defense_evasion techniques: T1218 sources: process_creation, windows

Detect Renamed LOLBins

low

Detects renamed LOLBins by monitoring process creation events where the image name is unusual for its path.

sigma tactics: defense_evasion techniques: T1036 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →