Potentially Suspicious Electron Application CommandLine

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects potentially suspicious CommandLine of electron apps (teams, discord, slack, etc.). This could be a sign of abuse to proxy execution through a signed binary.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\chrome.exe,\code.exe,\discord.exe,\GitHubDesktop.exe,\keybase.exe,\msedge_proxy.exe,\msedge.exe,\msedgewebview2.exe,\msteams.exe,\slack.exe,\Teams.exe" OR ORIGINALFILENAME = "chrome.exe,code.exe,discord.exe,GitHubDesktop.exe,keybase.exe,msedge_proxy.exe,msedge.exe,msedgewebview2.exe,msteams.exe,slack.exe,Teams.exe") AND COMMANDLINE contains "--browser-subprocess-path,--gpu-launcher,--renderer-cmd-prefix,--utility-cmd-prefix" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113, Nasreddine Bencherchali (Nextron Systems)