<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ml — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ml/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 18:08:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ml/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Windows Process Cluster Detected from Parent Process</title><link>https://feed.craftedsignal.io/briefs/2026-05-problemchild-suspicious-process/</link><pubDate>Fri, 15 May 2026 18:08:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-problemchild-suspicious-process/</guid><description>A machine learning job has identified a parent process spawning one or more suspicious Windows processes exhibiting unusually high malicious probability scores, indicating potential defense evasion tactics like masquerading and LOLBins usage.</description><content:encoded><![CDATA[<p>A machine learning job combination has identified a parent process with one or more suspicious Windows processes that exhibit unusually high malicious probability scores. The processes were predicted to be malicious by the ProblemChild supervised ML model and, when clustered, have an unusually high aggregate score according to an unsupervised ML model. This often indicates suspicious or malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed and Windows process events collected by Elastic Defend or Winlogbeat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via an unknown method (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker executes a legitimate Windows process (LOLBin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLBin is used to execute a malicious payload or script.</li>
<li>The malicious script spawns additional processes with the same parent process name, creating a process cluster.</li>
<li>The ProblemChild ML model identifies these spawned processes as having high malicious probability scores.</li>
<li>An unsupervised ML model detects the aggregate score of the process cluster as unusually high.</li>
<li>The attacker leverages the spawned processes to perform malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to undetected malicious activity on a Windows endpoint. This may allow attackers to evade traditional signature-based detections and execute commands, download malware, or perform other malicious actions while blending in with legitimate system processes. The specific impact depends on the attacker&rsquo;s objective but can include data theft, system compromise, or deployment of ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration assets are installed and configured correctly, as detailed in the rule&rsquo;s setup instructions.</li>
<li>Deploy the detection logic from this brief by enabling the associated machine learning job combination (<code>problem_child_high_sum_by_parent_ea</code>) within Elastic Security.</li>
<li>Investigate alerts generated by this rule by following the investigation steps outlined in the rule&rsquo;s documentation. Pay close attention to the parent process name and the command-line arguments of the suspicious processes.</li>
<li>Tune the anomaly threshold (<code>anomaly_threshold = 75</code>) to reduce false positives in your specific environment. Consider whitelisting known safe tools by creating exceptions for their parent process names.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>ml</category><category>lolbins</category></item></channel></rss>