Suspicious Child Process Of Veeam Dabatase

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects suspicious child processes of the Veeam service process. This could indicate potential RCE or SQL Injection.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PARENTPROCESSNAME endswith "\sqlservr.exe" AND PARENTPROCESSCOMMANDLINE contains "VEEAMSQL") AND ((PROCESSNAME endswith "\cmd.exe,\powershell.exe,\pwsh.exe,\wsl.exe,\wt.exe" AND COMMANDLINE contains "-ex ,bypass,cscript,DownloadString,http://,https://,mshta,regsvr32,rundll32,wscript,copy ") OR PROCESSNAME endswith "\net.exe,\net1.exe,\netstat.exe,\nltest.exe,\ping.exe,\tasklist.exe,\whoami.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems)