LOLBIN process executed with a high integrity level

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Privilege Escalation (TA0004)

ATT&CK Technique

Abuse Elevation Control Mechanism (T1548)

Severity

Low

Description

A process spawned a suspicious LOLBIN process with a higher/system integrity level.
The LOLBIN process spawned with an uncommon command line. This may be an indication of malicious code execution to gain privileges.

Attacker's Goals

An attacker may attempt to gain higher privileges.

Investigative actions

  • Check whether the command line executed is benign or normal for the host and/or user performing it.
    Investigate the endpoint to determine if it's a legitimate process that is supposed to run with privileges.

Variations

LOLBIN process executed with a high integrity level by a web server process or CGO

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

A process spawned a suspicious LOLBIN process with a higher/system integrity level by a web server process or CGO.
The LOLBIN process spawned with an uncommon command line. This may be an indication of malicious code execution to gain privileges.

Attacker's Goals

An attacker may attempt to gain higher privileges.

Investigative actions

  • Check whether the command line executed is benign or normal for the host and/or user performing it.
    Investigate the endpoint to determine if it's a legitimate process that is supposed to run with privileges.