LoFP LoFP / t1059.003

t1059.003

TitleTags
false positives may be high based on legitimate scripted code in any environment. filter as needed.
high
java tools are known to produce false-positive when loading libraries
legitimate administration script
legitimate programs can also use command-line arguments to execute. please verify the command-line arguments to check what command/program is being executed. we recommend customizing the `first_time_seen_cmd_line_filter` macro to exclude legitimate parent_process_name
legitimate use of screenconnect
legitimate use of screenconnect. disable this rule if screenconnect is heavily used.
limited to no known false positives.
need tuning applocker or add exceptions in siem
there are circumstances where an application may legitimately execute and interact with the windows command-line interface. investigate and modify the lookup file, as appropriate.
this detection may also be triggered by legitimate applications and numerous service accounts, which often end with a $ sign. to manage this, it's advised to check the service account's activities and, if they are valid, modify the filter macro to exclude them.
this model is an anomaly detector that identifies usage of apis and scripting constructs that are correllated with malicious activity. these apis and scripting constructs are part of the programming langauge and advanced scripts may generate false positives.
this process should not be ran forcefully, we have not see any false positives for this detection
unlikely
valid changes to the startup script