Uncommon Process Access Rights For Target Image

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects process access request to uncommon target images with a "PROCESS_ALL_ACCESS" access mask.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "sa_process_accessed" AND PROCESSNAME endswith "\calc.exe,\calculator.exe,\mspaint.exe,\notepad.exe,\ping.exe,\wordpad.exe,\write.exe" AND ACCESSRIGHT = "0x1FFFFF" select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PARENTPROCESSNAME,Action1.SRCUSER,Action1.TARGETUSER,Action1.CALLTRACE

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems), frack113