autochk Spawning Suspicious Child

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects instances where the parent process "autochk.exe" is running, and the child process is not "chkdsk.exe," "doskey.exe," or "WerFault.exe"

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "Process started" AND ((PARENTPROCESSNAME endswith "autochk.exe" AND PROCESSNAME notendswith "chkdsk.exe" AND PROCESSNAME notendswith "doskey.exe" AND PROCESSNAME notendswith "WerFault.exe")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows