Suspicious Windows Process Cluster from Parent Process via Machine Learning
A machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.
This alert leverages Elastic’s ProblemChild integration to detect potential Living off the Land (LotL) attacks on Windows systems. The rule utilizes a combination of supervised and unsupervised machine learning models to identify parent processes spawning clusters of suspicious child processes. These child processes are flagged as having unusually high malicious probability scores, suggesting the use of LOLBins or other defense evasion techniques. The detection focuses on identifying groups of processes with the same parent process name where the aggregated malicious score for the cluster is unusually high, as determined by an unsupervised machine learning model. The rule is active as of October 2023, with updates through April 2026 and requires Elastic Stack version 9.4.0 or later.
Attack Chain
- An attacker gains initial access to a Windows system through various means.
- The attacker leverages a legitimate, signed Windows binary (LOLBin) such as
powershell.exeorcmd.exe. - The LOLBin is used to execute malicious code or commands.
- The LOLBin spawns one or more child processes that perform malicious actions like reconnaissance or lateral movement.
- The ProblemChild supervised ML model flags the child processes as having a high malicious probability score.
- The unsupervised ML model calculates an unusually high aggregate score for the cluster of child processes originating from the same parent process.
- The detection rule triggers, identifying the suspicious parent-child process relationship.
- The attacker achieves their objective, such as data exfiltration or persistence.
Impact
A successful attack using LOLBins can allow adversaries to bypass traditional signature-based detections and operate undetected within a network. The masquerading of malicious activity as legitimate system processes makes it difficult for security teams to identify and respond to threats effectively. The impact can range from data theft and system compromise to ransomware deployment, depending on the attacker’s objectives. The machine learning detection helps analysts to prioritize alerts which may otherwise be missed.
Recommendation
- Ensure the Living off the Land (LotL) Attack Detection integration assets are installed within Elastic Security, as described in the “Setup” section of this brief.
- Investigate any alerts generated by the “Parent Process Detected with Suspicious Windows Process(es)” rule, focusing on the parent process name and the command-line arguments of the suspicious child processes (reference: Investigation Guide in the rule’s
notefield). - Tune the
anomaly_thresholdvalue (currently 75) in the rule configuration based on your environment’s baseline activity to reduce false positives. - Whitelisting parent process names can mitigate false positives generated by legitimate administrative tools. (reference: False positive analysis in the rule’s
notefield) - Enable Windows process creation logging via Elastic Defend or Winlogbeat to ensure the rule has the necessary data to function (reference: Setup section).
Detection coverage 2
Suspicious Windows Process Spawning from Common System Process
mediumDetects instances where a known system process spawns a suspicious Windows process with a high malicious probability, potentially indicating LOLBins usage.
Suspicious Process Cluster Detection via Parent-Child Relationship
lowDetects clusters of suspicious processes originating from the same parent process, leveraging process creation events.
Detection queries are kept inside the platform. Get full rules →