Skip to content
Threat Feed
medium advisory

Suspicious Svchost.exe Child Process: cmd.exe

Detection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.

The Service Host process (svchost.exe) is a legitimate Windows system process designed to host multiple Windows services. It is not intended to be used by non-Windows services or to spawn command interpreters directly. This detection focuses on identifying instances where cmd.exe is launched as a child process of svchost.exe. This activity is highly suspicious and may suggest that a malicious process is masquerading as svchost.exe or that an attacker has gained control and is attempting privilege escalation or lateral movement within the compromised system. The rule leverages process monitoring logs to identify this anomalous parent-child relationship. The original Elastic detection rule was published in 2020, and updated in May 2026.

Attack Chain

  1. Initial Compromise: An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using stolen credentials.
  2. Privilege Escalation: The attacker attempts to escalate privileges to gain higher-level access to the system.
  3. Service Exploitation: The attacker exploits a service hosted by svchost.exe or injects malicious code into a service process.
  4. Command Execution: The attacker leverages the compromised service to spawn cmd.exe as a child process of svchost.exe.
  5. Reconnaissance: The attacker uses cmd.exe to perform reconnaissance activities, such as gathering system information or network configuration details.
  6. Lateral Movement: The attacker uses cmd.exe to move laterally to other systems on the network, potentially using stolen credentials or exploiting vulnerabilities.
  7. Persistence: The attacker establishes persistence on the compromised system to maintain access even after a reboot.
  8. Data Exfiltration or System Damage: The attacker exfiltrates sensitive data from the compromised system or damages the system to disrupt operations.

Impact

A successful attack can lead to privilege escalation, lateral movement, data theft, or system compromise. The impact could range from minor data breaches to significant disruptions of business operations, depending on the attacker’s objectives and the extent of the compromise. Since svchost.exe is a critical system process, any compromise could result in widespread damage across the affected system.

Recommendation

  • Deploy the “Svchost spawning Cmd” Sigma rule to your SIEM to detect this suspicious parent-child relationship.
  • Enable process monitoring with command-line logging on Windows endpoints to provide the necessary data for the Sigma rule to function.
  • Investigate any alerts generated by the Sigma rule to determine the root cause and scope of the compromise.
  • Review and harden the security configuration of Windows services to prevent exploitation.
  • Enforce the principle of least privilege to limit the impact of a compromised service account.
  • Use threat intelligence platforms to identify and block known malicious indicators associated with svchost.exe exploits.

Detection coverage 2

Svchost Spawning Cmd

medium

Detects cmd.exe spawned by svchost.exe, which is an unusual process relationship indicating potential malicious activity.

sigma tactics: execution techniques: T1059.003 sources: process_creation, windows

Svchost Spawning Suspicious Process

medium

Detects suspicious processes spawned by svchost.exe based on command line arguments.

sigma tactics: execution techniques: T1059.003 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →