<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Process-Termination — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/process-termination/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/process-termination/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Process Terminating LSASS Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-terminating-lsass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-terminating-lsass/</guid><description>Detection of a process attempting to terminate the Lsass.exe process, indicating a potential attempt to perform credential dumping, privilege escalation, or evasion of security policies.</description><content:encoded><![CDATA[<p>This analytic detects a suspicious process attempting to terminate the Lsass.exe process. This is based on identifying processes being granted PROCESS_TERMINATE access to Lsass.exe, which is a critical process responsible for enforcing security policies and handling user credentials. Attackers may attempt to terminate the LSASS process to disable security policies or dump credentials. The initial report stems from ESplunk ESCU detections as of 2026-05-05. Successful termination of LSASS can lead to unauthorized access and persistence within the environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain the necessary permissions to interact with the LSASS process.</li>
<li>The attacker uses a malicious process to request the PROCESS_TERMINATE right on the LSASS process.</li>
<li>Sysmon logs EventCode 10, recording the process requesting PROCESS_TERMINATE access to lsass.exe.</li>
<li>The malicious process successfully terminates the LSASS process.</li>
<li>The operating system may crash or become unstable due to the termination of a critical system process.</li>
<li>The attacker may attempt to dump credentials or perform other malicious activities with the security policies disabled.</li>
<li>The attacker achieves their objective, such as gaining unauthorized access, stealing sensitive data, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful termination of the LSASS process can have severe consequences, including system instability, data loss, and unauthorized access to sensitive information. Attackers can leverage this to perform credential dumping, gain elevated privileges, and evade security policies. While the exact number of victims is not specified, the potential impact spans across organizations that rely on Windows-based systems for their operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventCode 10 logging to detect processes granted PROCESS_TERMINATE access to lsass.exe.</li>
<li>Deploy the Sigma rule <code>Detect LSASS Process Termination Attempt</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule and determine the root cause of the LSASS process termination.</li>
<li>Review access controls and permissions to limit the ability of unauthorized processes to interact with LSASS.</li>
<li>Monitor systems for unusual process behavior and investigate any suspicious activity promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lsass</category><category>process-termination</category><category>windows</category></item><item><title>Linux Defense Impairment via Process Termination</title><link>https://feed.craftedsignal.io/briefs/2024-01-linux-impair-defenses-process-kill/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linux-impair-defenses-process-kill/</guid><description>Detection of 'pkill' command execution on Linux systems, a technique used by threat actors to disable security defenses or terminate critical processes, potentially leading to data corruption or destruction.</description><content:encoded><![CDATA[<p>This threat brief focuses on the malicious use of the <code>pkill</code> command on Linux systems. Threat actors leverage <code>pkill</code> to terminate processes related to security defenses or other critical system functions. The identification of this behavior is crucial for defenders as it signifies an active attempt to impair security controls and evade detection. The observed activity allows further malicious actions and can result in the complete shutdown or disabling of endpoint detection and response agents. This ultimately leads to increased dwell time and potential data exfiltration or destruction. The analytic identifies executions of <code>pkill</code> via command-line arguments and process names.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker executes a reconnaissance command, such as <code>ps</code>, to identify running processes, including security tools.</li>
<li>The attacker uses <code>pkill</code> or <code>pgrep</code> to identify specific process IDs of targeted security applications.</li>
<li>The attacker executes <code>pkill &lt;PID&gt;</code> to terminate the targeted security processes.</li>
<li>The attacker confirms the successful termination of the security process using <code>ps</code> or similar commands.</li>
<li>With security defenses impaired, the attacker executes malicious code (e.g., malware, scripts) without immediate detection.</li>
<li>The attacker moves laterally within the network to compromise additional systems.</li>
<li>The attacker achieves their objective, which may include data exfiltration, data encryption (ransomware), or system destruction.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of <code>pkill</code> against security applications can severely impair an organization&rsquo;s ability to detect and respond to threats. This can lead to prolonged dwell time for attackers, enabling them to move laterally within the network, exfiltrate sensitive data, deploy ransomware, or cause irreparable damage to systems. The lack of immediate detection increases the potential for significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon for Linux Event ID 1 to capture process creation events, which are essential for detecting <code>pkill</code> executions.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious <code>pkill</code> command-line executions.</li>
<li>Investigate any alerts generated by these rules to determine the legitimacy of the <code>pkill</code> execution and identify potentially compromised systems.</li>
<li>Tune the Sigma rules in this brief for your environment by filtering out known benign uses of <code>pkill</code> by administrators.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>process-termination</category><category>linux</category></item><item><title>Excessive Taskkill Usage for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-excessive-taskkill/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-excessive-taskkill/</guid><description>Adversaries use taskkill.exe to disable security tools, and this detection identifies instances where taskkill.exe is executed excessively within a short timeframe, indicative of malicious activity aimed at defense evasion.</description><content:encoded><![CDATA[<p>This brief examines the excessive usage of <code>taskkill.exe</code>, a Windows command-line utility, as an indicator of potential malicious activity. The use of <code>taskkill.exe</code> is a known technique used by attackers to disable security tools or other critical processes to evade detection and maintain persistence on a compromised system. This analytic focuses on detecting instances where <code>taskkill.exe</code> is executed ten or more times within a one-minute span, which is considered an anomalous and suspicious behavior. This detection can identify activity associated with malware families like Azorult, AgentTesla, NjRAT, and XMRig. Successful execution of this technique can allow attackers to bypass security defenses, maintain persistence, and further compromise the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or compromised credentials.</li>
<li>The attacker executes a script or program designed to disable security tools.</li>
<li>The script utilizes <code>taskkill.exe</code> to terminate processes associated with antivirus software, endpoint detection and response (EDR) agents, and other security monitoring tools.</li>
<li><code>taskkill.exe</code> is executed repeatedly within a short timeframe (e.g., 10 or more times in one minute) to ensure the targeted processes are terminated.</li>
<li>With security tools disabled, the attacker can now execute malicious payloads without immediate detection.</li>
<li>The attacker deploys ransomware, steals sensitive data, or establishes a persistent backdoor on the system.</li>
<li>The attacker attempts to move laterally to other systems to expand their control within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via excessive taskkill usage can lead to significant disruption, data theft, and financial loss. If attackers successfully disable endpoint protection, they can deploy ransomware, steal sensitive data, or pivot to other systems. This impacts the confidentiality, integrity, and availability of the affected systems and data. Organizations in all sectors are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Excessive Taskkill Usage</code> to your SIEM to detect rapid taskkill executions and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rule.</li>
<li>Ensure that Windows Event Log Security Auditing is enabled (Event ID 4688) to capture process creation events.</li>
<li>Investigate any alerts generated by the Sigma rules, prioritizing those involving privileged accounts or critical systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>process-termination</category><category>windows</category></item><item><title>Detection of Process Termination via File Path Using WMIC</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-process-kill-file-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-process-kill-file-path/</guid><description>This analytic detects the use of `wmic.exe` with the `delete` command to terminate a process by specifying its executable path, often used to disable security tools or critical processes during the setup of malicious activities like cryptocurrency mining.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the use of the Windows Management Instrumentation Command-line (WMIC) utility to terminate processes by referencing their file paths. Specifically, it looks for instances where <code>wmic.exe</code> is used with the <code>delete</code> command targeting an executable path. This technique is often employed by attackers to disable security software, terminate competing processes (such as other miners), or halt critical system services, as seen in cases involving cryptocurrency miners. The activity is often associated with the initial stages of setting up malicious operations on an endpoint, giving defenders an opportunity to disrupt attacks early in the kill chain. The source material was released in 2026, but the underlying technique has been used since at least 2020.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, often through methods not directly covered by this detection (e.g., exploiting a vulnerability or using compromised credentials).</li>
<li>The attacker executes <code>wmic.exe</code> with specific parameters to target a running process.</li>
<li>The command includes the <code>process</code> argument to specify the process to be targeted, the <code>executablepath</code> argument to identify the process by its file path, and the <code>delete</code> command to terminate the process.</li>
<li><code>wmic.exe</code> attempts to locate the process based on the provided file path.</li>
<li>If the process is found, <code>wmic.exe</code> sends a termination signal to the process.</li>
<li>The targeted process is terminated.</li>
<li>The attacker repeats this process to disable other security tools or competing processes.</li>
<li>The attacker proceeds with their primary objective, such as deploying and executing a cryptocurrency miner or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this technique can lead to the disabling of security software, allowing malware to operate unimpeded. It can also result in the termination of critical system processes, leading to system instability or data loss. Observed cases include the deployment of XMRig cryptocurrency miners following the termination of security tools. If left unchecked, this activity can significantly increase the attacker&rsquo;s foothold within the compromised environment, facilitating further malicious actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Process Termination via WMIC File Path</code> to your SIEM and tune it for your environment to identify malicious process termination attempts.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security (4688) to provide the necessary data for the Sigma rules.</li>
<li>Investigate any identified instances of <code>wmic.exe</code> being used with the <code>delete</code> command, especially when targeting executable paths of known security products or critical system processes.</li>
<li>Implement the <code>process_kill_base_on_file_path_filter</code> macro referenced in the search query to reduce noise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>process-termination</category><category>wmic</category><category>cryptocurrency-mining</category><category>endpoint</category></item></channel></rss>