- Home
- Correlation Rule Library
- Suspicious parent spawning winlogon
Suspicious Parent Spawning Winlogon
Rule added on 20th February, 2024Prerequisite:
The rule requires Sysmon to be enabled for proper functioning.
Rule type:
Correlation
Rule description:
This rule monitors situations where a process besides the legitimate Windows Logon process (winlogon.exe) spawns a new winlogon process. This could be an attempt to bypass login security mechanisms.
Data source:
Windows: Network traffic, process, kernel
Relevant MITRE ATT&CK techniques and tactics:
Tactics: TA0004 - Privilege Escalation, TA0005 - Defense Evasion
Techniques: T1134 - Access Token Manipulation, T1036 - Masquerading
Sub-techniques: T1134.004 - Parent PID Spoofing
Criteria:
This rule checks if a process ending with "winlogon.exe" (including paths with System32 or SysWow64) is spawned.
It considers it suspicious if the parent process is not one of the legitimate smss.exe locations (Windows\System32\smss.exe, Windows\SysWow64\smss.exe, Windows\smss.exe, or Windows\System32\Event Agent\Bin\smss.exe).
When to enable this rule:
Enable this rule when the user wants to detect potential credential theft attacks leveraging malware installation, specifically targeting systems with suspicious parent processes spawning winlogon.
Compliance mapping:
- NIST CSF: DE.AE (Detection Processes) for identifying unauthorized use of the Windows logon process.
- CIS Control: 8 (Malware Defense) aimed at safeguarding the authentication process managed by winlogon.exe.