Detect processes masquerading as legitimate Windows processes:
Query:
SELECT * FROM processes WHERE LOWER(name)='svchost.exe' AND LOWER(path)!='c:windowssystem32svchost.exe' AND LOWER(path)!='c:windowssyswow64svchost.exe' AND path!='';Additional Query Info:
Version: 2.2.1
Platform: windows
Interval: 3600
JSON:
{ "queries": { "svchost.exe_incorrect_path": { "query" : "SELECT * FROM processes WHERE LOWER(name)='svchost.exe' AND LOWER(path)!='c:windowssystem32svchost.exe' AND LOWER(path)!='c:windowssyswow64svchost.exe' AND path!='';", "interval" : "3600", "platform" : "windows", "version": "2.2.1", "description" : "Detect processes masquerading as legitimate Windows processes", "value" : "" } } }