Detect processes masquerading as legitimate Windows processes:
Query:
SELECT name FROM processes WHERE pid=(SELECT parent FROM processes WHERE LOWER(name)='svchost.exe') AND LOWER(name)!='services.exe';Additional Query Info:
Version: 2.2.1
Platform: windows
Interval: 3600
JSON:
{ "queries": { "svchost.exe_incorrect_parent_process": { "query" : "SELECT name FROM processes WHERE pid=(SELECT parent FROM processes WHERE LOWER(name)='svchost.exe') AND LOWER(name)!='services.exe';", "interval" : "3600", "platform" : "windows", "version": "2.2.1", "description" : "Detect processes masquerading as legitimate Windows processes", "value" : "" } } }