-
-
Couldn't load subscription status.
- Fork 2.4k
Open
Labels
Description
Description of the Idea of the Rule
title: Suspicious Speech Runtime Binary Execution
description: >
This analytic looks for suspicious Speech Runtime Binary Execution, which is
not a common parent process for other processes. Suspicious child processes
spawned by speechruntime.exe could indicate an attempt to lateral movement
via SpeechRuntime DCOM & COM Hijacking.
tags:
- attack.defense_evasion
- attack.t1218
- attack.lateral_movement
- attack.t1021.003
author: andrewdanis
references:
- https://github.com/rtecCyberSec/SpeechRuntimeMove
logsource:
category: process_creation
product: windows
detection:
condition: Section_1
Section_1:
ParentImage|endswith: '\speechruntime.exe'
falsepositives:
- None noted. speechruntime seems to never legitimately spawn as a parent process.
level: high
status: test
Public References / Example Event Log
nasbench