Process Creation with Suspicious CommandLine Arguments

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This analytic rule detects process creation events with base64 encoded command line arguments. This could be an indication of a malicious process being executed.

Attribute Value
Type Analytic Rule
Solution Malware Protection Essentials
ID fdbcc0eb-44fb-467e-a51d-a91df0780a81
Severity Medium
Status Available
Kind Scheduled
Tactics Execution, DefenseEvasion
Techniques T1059, T1027
Required Connectors CrowdStrikeFalconEndpointProtection, MicrosoftThreatProtection, SentinelOne, VMwareCarbonBlack, CiscoSecureEndpoint, TrendMicroApexOne, TrendMicroApexOneAma
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Malware Protection Essentials