I published the following diary on isc.sans.edu: “Clean Binaries with Suspicious Behaviour“:
EDR or “Endpoint Detection & Response” is a key element of many networks today. An agent is installed on all endpoints to track suspicious/malicious activity and (try to) block it. Behavioral monitoring is also a key element in modern SIEM infrastructure: To see a word.exe running is definitively not malicious, same with a Powershell script being launched. But if you monitor parent/child relations, to see a Powershell script launched from a Word process, that is suspicious! Here is a simple Sigma rule to detect this behavior… [Read more]
The post [SANS ISC] Clean Binaries with Suspicious Behaviour appeared first on /dev/random.
Click to Open Code Editor