Skip to content

Commit b1e3545

Browse files
tweak
1 parent 0bb763f commit b1e3545

File tree

1 file changed

+162
-121
lines changed

1 file changed

+162
-121
lines changed
Lines changed: 162 additions & 121 deletions
Original file line numberDiff line numberDiff line change
@@ -1,144 +1,185 @@
1-
name: Sigma - Category - Process Creation
2-
id: 4f1db62f-cb41-41fb-8af3-11a67585b5db
1+
name: Sigma - Category - process_creation
2+
id: 3fa85f64-5717-4562-b3fc-2c963f66afa6
33
description: |
4-
Base Playbook for investigating process_creation-based alerts.
5-
type: detection
6-
detection_id: ''
7-
detection_category: 'process_creation'
8-
detection_type: 'sigma'
4+
Baseline Playbook for process creation events, OS agnostic. This playbook helps analysts investigate
5+
any suspicious process execution by examining context, legitimacy, impact, and threat indicators.
6+
Process creation alerts can range from legitimate administrative tools to known malware execution.
7+
type: sigma
8+
category: process_creation
99
contributors:
10-
- 'SecurityOnionSolutions'
11-
date: 2025-04-04
10+
- SecurityOnionSolutions
11+
date: 2025-05-29
1212
questions:
13-
- question: 'What was the exact process execution that triggered the alert?'
14-
context: 'Understanding the complete command line and process details provides crucial context about the activity.'
13+
14+
- question: What was the exact process execution that triggered the alert?
15+
context: |
16+
Examine the full context of the alert including command line arguments, parent process,
17+
and user context to understand what triggered this detection.
1518
answer_sources:
16-
- process_creation
19+
- alert
1720
query: |
18-
aggregation: false
19-
logsource:
20-
category: process_creation
21-
product: windows
22-
detection:
23-
selection:
24-
ProcessGuid|expand: '%ProcessGuid%'
25-
condition: selection
26-
fields:
27-
- User
28-
- Image
29-
- CommandLine
21+
aggregation: false
22+
logsource:
23+
category: alert
24+
detection:
25+
selection:
26+
document_id|expand: '%document_id%'
27+
condition: selection
28+
fields:
29+
- User
30+
- ParentImage
31+
- Image
32+
- CommandLine
3033
31-
- question: 'What is the process lineage (parent process chain)?'
32-
context: 'The process creation chain helps understand how the process was spawned and identify potential abuse of legitimate processes.'
34+
- question: Is this normal activity for this user and system?
35+
context: |
36+
Check if this user typically runs this process on this system. Historical patterns
37+
help distinguish between legitimate administrative work and anomalous behavior.
38+
range: -30d
3339
answer_sources:
34-
- process_creation
40+
- process_creation
3541
query: |
36-
aggregation: false
37-
logsource:
38-
category: process_creation
39-
product: windows
40-
detection:
41-
selection:
42-
ProcessGuid|expand: '%ParentProcessGuid%'
43-
condition: selection
44-
fields:
45-
- User
46-
- ParentImage
47-
- Image
48-
- CommandLine
42+
aggregation: false
43+
logsource:
44+
category: process_creation
45+
detection:
46+
selection:
47+
hostname|expand: '%hostname%'
48+
Image|expand: '%Image%'
49+
condition: selection
50+
fields:
51+
- User
52+
- CommandLine
4953
50-
- question: 'What child processes were spawned?'
51-
context: 'Child processes can indicate the full scope of the activity and subsequent actions taken.'
52-
range: +5m
54+
- question: What is the process execution chain around this event?
55+
context: |
56+
Examine parent process activity, sibling processes, and child processes to understand
57+
the complete execution flow and identify the root cause or subsequent actions.
58+
range: +/-5m
5359
answer_sources:
54-
- process_creation
60+
- process_creation
5561
query: |
56-
aggregation: false
57-
logsource:
58-
category: process_creation
59-
product: windows
60-
detection:
61-
selection:
62-
ParentProcessGuid|expand: '%ProcessGuid%'
63-
condition: selection
64-
fields:
65-
- Image
66-
- CommandLine
62+
aggregation: false
63+
logsource:
64+
category: process_creation
65+
detection:
66+
parent_activity:
67+
hostname|expand: '%hostname%'
68+
ParentProcessGuid|expand: '%ParentProcessGuid%'
69+
child_activity:
70+
hostname|expand: '%hostname%'
71+
ParentProcessGuid|expand: '%ProcessGuid%'
72+
condition: parent_activity or child_activity
73+
fields:
74+
- CreationUtcTime
75+
- Image
76+
- CommandLine
77+
- User
78+
- ParentImage
6779
68-
- question: 'What files were accessed by the process?'
69-
context: 'File interactions can reveal what data or systems were targeted.'
70-
range: +/-5m
80+
- question: What other processes did this user execute recently?
81+
context: |
82+
Understanding the user's recent activity helps establish intent and identify
83+
suspicious behavior or legitimate workflows.
84+
range: +/-10m
7185
answer_sources:
72-
- file_event
86+
- process_creation
7387
query: |
74-
aggregation: false
75-
logsource:
76-
category: file_event
77-
product: windows
78-
detection:
79-
selection:
80-
ProcessGuid|expand: '%ProcessGuid%'
81-
condition: selection
82-
fields:
83-
- Image
84-
- TargetFilename
88+
aggregation: false
89+
logsource:
90+
category: process_creation
91+
detection:
92+
selection:
93+
hostname|expand: '%hostname%'
94+
User|expand: '%User%'
95+
condition: selection
96+
fields:
97+
- CreationUtcTime
98+
- Image
99+
- CommandLine
100+
- ParentImage
85101
86-
- question: 'What network connections were established by the process?'
87-
context: 'Network connections can indicate command and control activity or other malicious activity.'
88-
range: +/-15m
102+
- question: What files did this process create or modify?
103+
context: |
104+
File creation and modification patterns reveal the process's actual behavior and potential impact.
105+
Look for sensitive data access, configuration changes, or payload drops.
106+
range: +30m
89107
answer_sources:
90-
- network_connection
108+
- file_event
91109
query: |
92-
aggregation: false
93-
logsource:
94-
category: network_connection
95-
product: windows
96-
detection:
97-
selection:
98-
ProcessGuid|expand: '%ProcessGuid%'
99-
condition: selection
100-
fields:
101-
- Image
102-
- DestinationIp
103-
- DestinationPort
110+
aggregation: true
111+
logsource:
112+
category: file_event
113+
detection:
114+
selection:
115+
hostname|expand: '%hostname%'
116+
ProcessGuid|expand: '%ProcessGuid%'
117+
condition: selection
118+
fields:
119+
- EventType
120+
- TargetFilename
104121
105-
- question: 'Has this process executed on this host before?'
106-
context: 'Historical execution patterns help establish if this is normal behavior for this system.'
107-
range: -30d
122+
- question: What network connections did this process make?
123+
context: |
124+
Network activity can reveal command and control, data exfiltration, or lateral
125+
movement attempts.
126+
range: +30m
108127
answer_sources:
109-
- process_creation
128+
- network_connection
110129
query: |
111-
aggregation: false
112-
logsource:
113-
category: process_creation
114-
product: windows
115-
detection:
116-
selection:
117-
Image|endswith|expand: '%Image%'
118-
hostname|expand: '%hostname%'
119-
condition: selection
120-
fields:
121-
- User
122-
- ParentImage
123-
- Image
124-
- CommandLine
130+
aggregation: true
131+
logsource:
132+
category: network_connection
133+
detection:
134+
selection:
135+
hostname|expand: '%hostname%'
136+
ProcessGuid|expand: '%ProcessGuid%'
137+
condition: selection
138+
fields:
139+
- DestinationIp
140+
- DestinationPort
141+
- Initiated
125142
126-
- question: 'What other processes were running around the same time?'
127-
context: 'Understanding the broader process execution context can reveal related suspicious activity.'
128-
range: +/-10m
143+
- question: What registry changes did this process make?
144+
context: |
145+
On Windows systems, registry activity can reveal further intent. The query looks for registry changes made by both the process and its parent.
146+
range: +30m
147+
answer_sources:
148+
- registry_event
149+
query: |
150+
aggregation: true
151+
logsource:
152+
category: registry_event
153+
detection:
154+
selection:
155+
hostname|expand: '%hostname%'
156+
ProcessGuid|expand: '%ProcessGuid%'
157+
ParentProcessGuid|expand: '%ParentProcessGuid%'
158+
condition: selection
159+
fields:
160+
- EventType
161+
- TargetRegistryKey
162+
- TargetRegistryValueName
163+
- TargetRegistryValueType
164+
165+
- question: Is similar activity occurring across the organization?
166+
context: |
167+
Search for the same command patterns on other systems to determine if this is
168+
isolated or part of a broader attack. Check both recent and historical timeframes.
169+
range: -7d
129170
answer_sources:
130-
- process_creation
171+
- process_creation
131172
query: |
132-
aggregation: false
133-
logsource:
134-
category: process_creation
135-
product: windows
136-
detection:
137-
selection:
138-
hostname|expand: '%hostname%'
139-
condition: selection
140-
fields:
141-
- User
142-
- ParentImage
143-
- Image
144-
- CommandLine
173+
aggregation: true
174+
logsource:
175+
category: process_creation
176+
detection:
177+
selection:
178+
CommandLine|expand: '%CommandLine%'
179+
filter:
180+
hostname|expand: '%hostname%'
181+
condition: selection and not filter
182+
fields:
183+
- hostname
184+
- User
185+
- Image

0 commit comments

Comments
 (0)