Suspicious Zoom Child Process Execution
A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.
This detection identifies suspicious child processes spawned by Zoom.exe, potentially indicating an attempt to evade detection or exploit vulnerabilities within the Zoom application. The rule focuses on detecting instances where command interpreters like cmd.exe, PowerShell, or PowerShell ISE are launched as child processes of Zoom. This behavior can be indicative of an attacker attempting to execute malicious commands or scripts within the context of the Zoom application, potentially escalating privileges or gaining unauthorized access to system resources. It’s crucial for defenders to investigate such occurrences, as they may signify ongoing exploitation or malicious activity leveraging Zoom as an initial access vector.
Attack Chain
- User launches the Zoom application (Zoom.exe).
- A vulnerability in Zoom is exploited, or the user is socially engineered into running a malicious command.
- Zoom.exe spawns a child process, such as cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.
- The spawned process executes commands or scripts, potentially downloading or executing malware.
- The malicious script or command performs reconnaissance activities on the system.
- The script establishes persistence by creating a scheduled task or modifying registry keys.
- The attacker gains remote access to the compromised system.
- The attacker performs lateral movement and data exfiltration.
Impact
Successful exploitation could allow attackers to execute arbitrary commands, escalate privileges, and compromise the affected system. Depending on the user’s privileges, attackers could gain access to sensitive data, install malware, or pivot to other systems on the network. The impact ranges from data breaches to complete system compromise, potentially affecting all users within the organization who utilize the Zoom application.
Recommendation
- Deploy the Sigma rule “Suspicious Zoom Child Process” to your SIEM to detect command interpreters spawned by Zoom.exe. Tune the rule for your environment to minimize false positives.
- Enable Sysmon process creation logging (Event ID 1) to capture detailed information about process executions, which is essential for the Sigma rule above.
- Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments and network connections of the spawned processes.
- Monitor Windows Security Event Logs for process creation events related to Zoom.exe and its child processes to identify suspicious behavior.
- Consider implementing application control policies to restrict the execution of unauthorized processes within the Zoom application context.
Detection coverage 2
Suspicious Zoom Child Process
mediumDetects command interpreters spawned as child processes of Zoom.exe, potentially indicating malicious activity.
Suspicious Zoom Child Process CommandLine
mediumDetects command interpreters spawned as child processes of Zoom.exe with suspicious commandline arguments.
Detection queries are kept inside the platform. Get full rules →