Suspicious Provlaunch.EXE Child Process
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects suspicious child processes spawned by "provlaunch.exe," which may indicate potential exploitation for proxy execution abuse. The rule monitors launching of processes such as calc.exe, cmd.exe, cscript.exe, mshta.exe, notepad.exe, powershell.exe, pwsh.exe, regsvr32.exe, rundll32.exe, and wscript.exe or execution from common temporary or scheduled task directories.
Severity
Trouble
Rule journey
Attack chain scenario
Defense Evasion: System Binary Proxy Execution (T1218)
Impact
Attackers may abuse trusted binaries like provlaunch.exe to proxy execution of malicious code, allowing stealthy execution and evasion of security controls.
Rule Requirement
Prerequisites
Using Windows Event Viewer
- Log in to a domain controller with domain admin credentials.
- Open the Group Policy Management Console by typing gpmc.msc in the Run dialog.
- Create a new GPO or edit an existing one linked to the appropriate OU.
- Navigate to:
Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies → Detailed Tracking - Right-click on Audit Process Creation, select Properties, then:
- Check Configure the following audit events
- Select Success
- Right-click on Audit Process Termination, select Properties, then:
- Check Configure the following audit events
- Select Success
- To include command-line details in logs:
- Go to Computer Configuration → Administrative Templates → System → Audit Process Creation
- Open Include command line in process creation events
- Select Enabled
- Create the registry key:
Microsoft-Windows-Security-Auditing/Operational
Under the path:
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\
Using Sysmon
- Download and install Sysmon from Microsoft Sysinternals.
- Open Command Prompt with administrator privileges.
- Create or download a Sysmon configuration file that includes process creation monitoring.
- Install Sysmon using:
sysmon.exe -i [configfile.xml] - In your config file, ensure the following section is included to monitor all process creation events:
<Sysmon>
<EventFiltering>
<ProcessCreate onmatch="exclude"/>
<!-- This captures all process creations -->
</EventFiltering>
</Sysmon>
- Create the registry key:
Microsoft-Windows-Sysmon/Operational
Under the path:
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\
Criteria
Action1: actionname = "Process started" AND PARENTPROCESSNAME endswith "\provlaunch.exe" AND (PROCESSNAME endswith "\calc.exe,\cmd.exe,\cscript.exe,\mshta.exe,\notepad.exe,\powershell.exe,\pwsh.exe,\regsvr32.exe,\rundll32.exe,\wscript.exe" OR PROCESSNAME contains ":\PerfLogs\,:\Temp\,:\Users\Public\,\AppData\Temp\,\Windows\System32\Tasks\,\Windows\Tasks\,\Windows\Temp") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
MITRE ATT&CK
T1218: System Binary Proxy Execution
Security Standards
- Disable or remove unnecessary native binaries that could be exploited.
- Employ application control to block execution of vulnerable or unnecessary binaries.
- Utilize exploit protection tools like EMET or Attack Surface Reduction rules to prevent proxy execution.
- Implement network filtering to detect and block suspicious traffic and protocol abuses.
- Restrict execution of sensitive binaries to privileged accounts.
- Apply web content restrictions to limit exposure to malicious content.
Author
Nasreddine Bencherchali (Nextron Systems)
Future actions
Known False Positives
None documented; further investigation may be required to rule out benign use.
Next Steps
- Investigate detected child processes of provlaunch.exe for potential suspicious behavior.
- Review necessity of provlaunch.exe usage and limit where possible.
- Enforce process creation auditing and monitoring.
- Deploy exploit protection and network filtering as preventive controls.
- Train security teams on recognizing proxy execution abuse.
Mitigation
Mitigation ID | Name | Description |
M1042 | Disable or Remove Feature | Remove or disable native binaries unnecessary for operations to reduce attack surface. |
M1038 | Execution Prevention | Use application control to block execution of binaries prone to abuse and not required. |
M1050 | Exploit Protection | Leverage Microsoft EMET or ASR to block proxy execution methods using trusted binaries. |
M1037 | Filter Network Traffic | Deploy network appliances to filter and monitor protocol-based and suspicious ingress/egress traffic. |
M1026 | Privileged Account Management | Restrict execution of vulnerable binaries to privileged users only. |
M1021 | Restrict Web-Based Content | Block downloads, attachments, JavaScript, and browser extensions that may facilitate exploitation. |


