Techniques
Sample rules
Unusual Child Process of dns.exe
- source: elastic
- technicques:
- T1210
Description
Identifies an unexpected process spawning from dns.exe, the process responsible for Windows DNS server services, which may indicate activity related to remote code execution or other forms of exploitation.
Detection logic
process where host.os.type == "windows" and event.type == "start" and process.parent.name : "dns.exe" and
not process.name : "conhost.exe"