User Detected with Suspicious Windows Process(es)
A machine learning job combination has identified a user with one or more suspicious Windows processes exhibiting unusually high malicious probability scores, potentially involving LOLbins for defense evasion.
A machine learning job combination has flagged users with suspicious Windows processes exhibiting unusually high malicious probability scores. This detection leverages the ProblemChild supervised ML model to identify processes classified as malicious in several ways. Anomalies containing clusters of suspicious processes, each with the same username, have an aggregate score calculated to be unusually high by an unsupervised ML model. Such clusters often contain suspicious or malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.
Attack Chain
- An attacker gains initial access to a Windows system.
- The attacker uses a LOLBin (Living Off The Land Binary) such as PowerShell or WMI to execute malicious commands.
- The LOLBin spawns one or more child processes, creating a cluster of processes associated with the same user.
- A supervised machine learning model, ProblemChild, identifies these processes as having a high probability of being malicious.
- An unsupervised machine learning model calculates an unusually high aggregate score for the event cluster.
- The detection triggers based on the combination of supervised and unsupervised ML scores.
- The attacker leverages the LOLBin for defense evasion, bypassing conventional search rule detections.
- The attacker achieves their objective, such as lateral movement or data exfiltration.
Impact
A successful attack leveraging LOLbins can lead to significant system compromise, including data theft, system disruption, and lateral movement within the network. While this detection has low severity, it identifies potential malicious activity that may be resistant to traditional detection methods. False positives from legitimate administrative tools and software updates may occur.
Recommendation
- Install and configure the Living off the Land (LotL) Attack Detection integration assets as outlined in the setup instructions.
- Ensure Windows process events are being collected by integrations such as Elastic Defend or Winlogbeat as described in the setup instructions.
- Review and tune the machine learning job identified by
machine_learning_job_id: problem_child_high_sum_by_user_eato minimize false positives, focusing on legitimate administrative tools like PowerShell and WMI. - Implement enhanced monitoring and detection rules to identify similar patterns of behavior, focusing on the specific tactics and techniques used in this incident.
- Investigate alerts generated by this rule using the investigation guide to determine the scope of the incident and any potential compromise.
Detection coverage 2
Detect Suspicious WMI Process Creation
lowDetects suspicious WMI process creations that may be indicative of LOLBin abuse. (T1036, T1218)
Detect Suspicious PowerShell Process Creation
lowDetects suspicious powershell.exe process creations with unusual parent processes that may be indicative of LOLBin abuse. (T1036, T1218)
Detection queries are available on the platform. Get full rules →