Conhost.exe spawned a suspicious cmd process

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

System Binary Proxy Execution (T1218)

Severity

Low

Description

Attackers may abuse the conhost process to execute malicious files and evade detection.

Attacker's Goals

Investigate the processes being spawned on the host for malicious activities.

Investigative actions

An adversary may use the conhost process to evade detection.

Variations

Conhost.exe spawned a suspicious child process

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

System Binary Proxy Execution (T1218)

Severity

Medium

Description

Attackers may abuse the conhost process to execute malicious files and evade detection.

Attacker's Goals

Investigate the processes being spawned on the host for malicious activities.

Investigative actions

An adversary may use the conhost process to evade detection.