Suspicious Child Process Of Veeam Dabatase
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects suspicious child processes of the Veeam service process. This could indicate potential RCE or SQL Injection.
Severity
Critical
Rule Requirement
Criteria
Action1: actionname = "Process started" AND (PARENTPROCESSNAME endswith "\sqlservr.exe" AND PARENTPROCESSCOMMANDLINE contains "VEEAMSQL") AND ((PROCESSNAME endswith "\cmd.exe,\powershell.exe,\pwsh.exe,\wsl.exe,\wt.exe" AND COMMANDLINE contains "-ex ,bypass,cscript,DownloadString,http://,https://,mshta,regsvr32,rundll32,wscript,copy ") OR PROCESSNAME endswith "\net.exe,\net1.exe,\netstat.exe,\nltest.exe,\ping.exe,\tasklist.exe,\whoami.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Nasreddine Bencherchali (Nextron Systems)


