Process Creation
Process Creation Monitoring and Analysis: A Key Pillar of Windows Security
Process creation events play a crucial role in detecting malicious activities within a Windows environment. This guide explores their significance, configuration, and practical analysis to enhance your forensic and threat-hunting capabilities.
Key Concepts of Process Creation Events
When enabled, Event ID 4688 logs every process initiated on a system. This event provides defenders with visibility into potentially malicious behavior.
Why It’s Important
Command Line Parameters: Offer detailed context, showing the intent behind each process.
Visibility: Critical for identifying unusual or unauthorized activities.
Enabling Process Creation Audit Logs
Step 1: Enable Process Creation Auditing
Open Group Policy Editor:
Search for Edit Group Policy in the Windows search bar.
Navigate to: Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Detailed Tracking > Audit Process Creation.
Set Audit Process Creation to Success.
Step 2: Enable Command Line Logging
In Group Policy Editor, go to: Computer Configuration > Administrative Templates > System > Audit Process Creation.
Enable Include Command Line in Process Creation Events.
Event Fields Breakdown
Once enabled, Event ID 4688 provides several key fields:
Account Name: User account responsible for executing the process.
New Process Name: Name of the newly created process.
Creator Process Name: Parent process initiating the new process.
Process Command Line: Full command line with arguments, offering critical insights.
Example Analysis
Consider the following example:
New Process Name:
net.exe
Creator Process Name:
cmd.exe
Process Command Line:
This event reveals an attacker using net.exe
to create a backdoor user account, Supp0rt, with the password LetsDefendEventLogs.
MITRE ATT&CK Context
Tactic: Initial Access
Technique: T1136: Create Account
The parent-child relationship between cmd.exe
and net.exe
, combined with the command line arguments, highlights an unauthorized account creation attempt.
Using Process Creation Logs for Threat Hunting
Indicators of Malicious Activity
Unexpected Parent-Child Process Relationships:
Examples:
word.exe
spawningpowershell.exe
explorer.exe
spawningcmd.exe
Suspicious Command Line Arguments:
PowerShell Encoded Commands:
Net User Commands:
Uncommon Process Names or Locations:
Processes running from non-standard directories like %TEMP% or %APPDATA%.
Centralized Logging with SIEM
Centralize Logs: Collect Event ID 4688 in a SIEM platform to streamline correlation and analysis.
Automate Alerts: Set up SIEM rules to flag suspicious processes and command line patterns.
Key Points
Process creation events, especially when enriched with command line arguments, are invaluable in detecting and responding to malicious activities. By enabling these logs and leveraging them for analysis, security analysts can:
Monitor suspicious activity
Identify potential threats
Strengthen enterprise security
Last updated