1- name : Sigma - Category - Process Creation
2- id : 4f1db62f-cb41-41fb-8af3-11a67585b5db
1+ name : Sigma - Category - process_creation
2+ id : 3fa85f64-5717-4562-b3fc-2c963f66afa6
33description : |
4- Base Playbook for investigating process_creation-based alerts.
5- type : detection
6- detection_id : ' '
7- detection_category : ' process_creation '
8- detection_type : ' sigma '
4+ Baseline Playbook for process creation events, OS agnostic. This playbook helps analysts investigate
5+ any suspicious process execution by examining context, legitimacy, impact, and threat indicators.
6+ Process creation alerts can range from legitimate administrative tools to known malware execution.
7+ type : sigma
8+ category : process_creation
99contributors :
10- - ' SecurityOnionSolutions'
11- date : 2025-04-04
10+ - SecurityOnionSolutions
11+ date : 2025-05-29
1212questions :
13- - question : ' What was the exact process execution that triggered the alert?'
14- context : ' Understanding the complete command line and process details provides crucial context about the activity.'
13+
14+ - question : What was the exact process execution that triggered the alert?
15+ context : |
16+ Examine the full context of the alert including command line arguments, parent process,
17+ and user context to understand what triggered this detection.
1518 answer_sources :
16- - process_creation
19+ - alert
1720 query : |
18- aggregation: false
19- logsource:
20- category: process_creation
21- product: windows
22- detection :
23- selection:
24- ProcessGuid|expand: '%ProcessGuid%'
25- condition: selection
26- fields:
27- - User
28- - Image
29- - CommandLine
21+ aggregation: false
22+ logsource:
23+ category: alert
24+ detection:
25+ selection :
26+ document_id|expand: '%document_id%'
27+ condition: selection
28+ fields:
29+ - User
30+ - ParentImage
31+ - Image
32+ - CommandLine
3033
31- - question : ' What is the process lineage (parent process chain)?'
32- context : ' The process creation chain helps understand how the process was spawned and identify potential abuse of legitimate processes.'
34+ - question : Is this normal activity for this user and system?
35+ context : |
36+ Check if this user typically runs this process on this system. Historical patterns
37+ help distinguish between legitimate administrative work and anomalous behavior.
38+ range : -30d
3339 answer_sources :
34- - process_creation
40+ - process_creation
3541 query : |
36- aggregation: false
37- logsource:
38- category: process_creation
39- product: windows
40- detection:
41- selection:
42- ProcessGuid|expand: '%ParentProcessGuid%'
43- condition: selection
44- fields:
45- - User
46- - ParentImage
47- - Image
48- - CommandLine
42+ aggregation: false
43+ logsource:
44+ category: process_creation
45+ detection:
46+ selection:
47+ hostname|expand: '%hostname%'
48+ Image|expand: '%Image%'
49+ condition: selection
50+ fields:
51+ - User
52+ - CommandLine
4953
50- - question : ' What child processes were spawned?'
51- context : ' Child processes can indicate the full scope of the activity and subsequent actions taken.'
52- range : +5m
54+ - question : What is the process execution chain around this event?
55+ context : |
56+ Examine parent process activity, sibling processes, and child processes to understand
57+ the complete execution flow and identify the root cause or subsequent actions.
58+ range : +/-5m
5359 answer_sources :
54- - process_creation
60+ - process_creation
5561 query : |
56- aggregation: false
57- logsource:
58- category: process_creation
59- product: windows
60- detection:
61- selection:
62- ParentProcessGuid|expand: '%ProcessGuid%'
63- condition: selection
64- fields:
65- - Image
66- - CommandLine
62+ aggregation: false
63+ logsource:
64+ category: process_creation
65+ detection:
66+ parent_activity:
67+ hostname|expand: '%hostname%'
68+ ParentProcessGuid|expand: '%ParentProcessGuid%'
69+ child_activity:
70+ hostname|expand: '%hostname%'
71+ ParentProcessGuid|expand: '%ProcessGuid%'
72+ condition: parent_activity or child_activity
73+ fields:
74+ - CreationUtcTime
75+ - Image
76+ - CommandLine
77+ - User
78+ - ParentImage
6779
68- - question : ' What files were accessed by the process?'
69- context : ' File interactions can reveal what data or systems were targeted.'
70- range : +/-5m
80+ - question : What other processes did this user execute recently?
81+ context : |
82+ Understanding the user's recent activity helps establish intent and identify
83+ suspicious behavior or legitimate workflows.
84+ range : +/-10m
7185 answer_sources :
72- - file_event
86+ - process_creation
7387 query : |
74- aggregation: false
75- logsource:
76- category: file_event
77- product: windows
78- detection:
79- selection:
80- ProcessGuid|expand: '%ProcessGuid%'
81- condition: selection
82- fields:
83- - Image
84- - TargetFilename
88+ aggregation: false
89+ logsource:
90+ category: process_creation
91+ detection:
92+ selection:
93+ hostname|expand: '%hostname%'
94+ User|expand: '%User%'
95+ condition: selection
96+ fields:
97+ - CreationUtcTime
98+ - Image
99+ - CommandLine
100+ - ParentImage
85101
86- - question : ' What network connections were established by the process?'
87- context : ' Network connections can indicate command and control activity or other malicious activity.'
88- range : +/-15m
102+ - question : What files did this process create or modify?
103+ context : |
104+ File creation and modification patterns reveal the process's actual behavior and potential impact.
105+ Look for sensitive data access, configuration changes, or payload drops.
106+ range : +30m
89107 answer_sources :
90- - network_connection
108+ - file_event
91109 query : |
92- aggregation: false
93- logsource:
94- category: network_connection
95- product: windows
96- detection:
97- selection:
98- ProcessGuid|expand: '%ProcessGuid%'
99- condition: selection
100- fields:
101- - Image
102- - DestinationIp
103- - DestinationPort
110+ aggregation: true
111+ logsource:
112+ category: file_event
113+ detection:
114+ selection:
115+ hostname|expand: '%hostname%'
116+ ProcessGuid|expand: '%ProcessGuid%'
117+ condition: selection
118+ fields:
119+ - EventType
120+ - TargetFilename
104121
105- - question : ' Has this process executed on this host before?'
106- context : ' Historical execution patterns help establish if this is normal behavior for this system.'
107- range : -30d
122+ - question : What network connections did this process make?
123+ context : |
124+ Network activity can reveal command and control, data exfiltration, or lateral
125+ movement attempts.
126+ range : +30m
108127 answer_sources :
109- - process_creation
128+ - network_connection
110129 query : |
111- aggregation: false
112- logsource:
113- category: process_creation
114- product: windows
115- detection:
116- selection:
117- Image|endswith|expand: '%Image%'
118- hostname|expand: '%hostname%'
119- condition: selection
120- fields:
121- - User
122- - ParentImage
123- - Image
124- - CommandLine
130+ aggregation: true
131+ logsource:
132+ category: network_connection
133+ detection:
134+ selection:
135+ hostname|expand: '%hostname%'
136+ ProcessGuid|expand: '%ProcessGuid%'
137+ condition: selection
138+ fields:
139+ - DestinationIp
140+ - DestinationPort
141+ - Initiated
125142
126- - question : ' What other processes were running around the same time?'
127- context : ' Understanding the broader process execution context can reveal related suspicious activity.'
128- range : +/-10m
143+ - question : What registry changes did this process make?
144+ context : |
145+ On Windows systems, registry activity can reveal further intent. The query looks for registry changes made by both the process and its parent.
146+ range : +30m
147+ answer_sources :
148+ - registry_event
149+ query : |
150+ aggregation: true
151+ logsource:
152+ category: registry_event
153+ detection:
154+ selection:
155+ hostname|expand: '%hostname%'
156+ ProcessGuid|expand: '%ProcessGuid%'
157+ ParentProcessGuid|expand: '%ParentProcessGuid%'
158+ condition: selection
159+ fields:
160+ - EventType
161+ - TargetRegistryKey
162+ - TargetRegistryValueName
163+ - TargetRegistryValueType
164+
165+ - question : Is similar activity occurring across the organization?
166+ context : |
167+ Search for the same command patterns on other systems to determine if this is
168+ isolated or part of a broader attack. Check both recent and historical timeframes.
169+ range : -7d
129170 answer_sources :
130- - process_creation
171+ - process_creation
131172 query : |
132- aggregation: false
133- logsource:
134- category: process_creation
135- product: windows
136- detection :
137- selection:
138- hostname|expand: '%hostname%'
139- condition: selection
140- fields:
141- - User
142- - ParentImage
143- - Image
144- - CommandLine
173+ aggregation: true
174+ logsource:
175+ category: process_creation
176+ detection:
177+ selection :
178+ CommandLine|expand: '%CommandLine%'
179+ filter:
180+ hostname|expand: '%hostname%'
181+ condition: selection and not filter
182+ fields:
183+ - hostname
184+ - User
185+ - Image
0 commit comments