Suspicious Process Masquerading As SvcHost.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects a suspicious process that is masquerading as the legitimate "svchost.exe" by naming its binary "svchost.exe" and executing from an uncommon location. Adversaries often disguise their malicious binaries by naming them after legitimate system processes like "svchost.exe" to evade detection.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND PROCESSNAME endswith "\svchost.exe" AND (PROCESSNAME != "C:\Windows\System32\svchost.exe,C:\Windows\SysWOW64\svchost.exe" AND ORIGINALFILENAME != "svchost.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Swachchhanda Shrawan Poudel