Potential Masquerading as Svchost
Attackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.
Attackers may attempt to evade detection by masquerading as legitimate system processes, specifically svchost.exe. The svchost.exe process is a critical component of the Windows operating system, responsible for hosting multiple Windows services. By naming a malicious executable svchost.exe and placing it in a non-standard directory, attackers aim to blend in with normal system activity and bypass security controls that rely on process names or paths. This technique is particularly effective because svchost.exe is a common and trusted process, making it less likely to be scrutinized by users or security software. This detection focuses on identifying processes named svchost.exe that are not running from the legitimate Windows system directories.
Attack Chain
- An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.
- The attacker uploads a malicious executable disguised as
svchost.exeto a non-standard directory, such asC:\Users\Public\. - The attacker executes the malicious
svchost.exeprocess from the non-standard location. - The masquerading process attempts to mimic legitimate
svchost.exebehavior to avoid suspicion. - The malicious
svchost.exeprocess may establish network connections to external command-and-control servers. - The process may execute malicious payloads, such as downloading additional malware or performing lateral movement.
- The attacker leverages the compromised system to access sensitive data or perform other malicious activities.
- The attacker attempts to maintain persistence on the system to ensure continued access.
Impact
A successful masquerading attack can lead to undetected execution of malicious code, allowing attackers to compromise systems, steal data, or establish persistent access. Because the malicious process is disguised as a legitimate system component, it may evade detection by traditional security measures. This can result in significant damage to the affected organization, including data breaches, financial loss, and reputational damage.
Recommendation
- Enable process creation logging with command line details to capture the execution of processes, including their names and paths.
- Deploy the Sigma rule “Potential Svchost Masquerading” to detect
svchost.exeprocesses running from non-standard locations. - Investigate any alerts generated by the Sigma rule to determine the legitimacy of the
svchost.exeprocess and its activities. - Implement file integrity monitoring to detect unauthorized modifications to system files, including the
svchost.exeexecutable in the system directories. - Use application control lists (ACLs) to restrict the execution of executables from non-standard directories.
Detection coverage 2
Potential Svchost Masquerading
highDetects processes named svchost.exe running from non-standard paths.
Svchost Masquerading with Unusual Parent Process
mediumDetects svchost.exe processes running from non-standard paths with unusual parent processes.
Detection queries are kept inside the platform. Get full rules →