Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/samerde/get-riskyprocesses
Checks running processes for a list of potentially "risky" ones that should not be spawned by certain parent processes. If found, the results could indicate abnormal behavior.
https://github.com/samerde/get-riskyprocesses
edr exchange-server hacktoberfest iis infosectools powershell windows
Last synced: 4 months ago
JSON representation
Checks running processes for a list of potentially "risky" ones that should not be spawned by certain parent processes. If found, the results could indicate abnormal behavior.
- Host: GitHub
- URL: https://github.com/samerde/get-riskyprocesses
- Owner: SamErde
- License: gpl-3.0
- Created: 2020-06-26T10:24:44.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-11-23T23:23:35.000Z (about 1 year ago)
- Last Synced: 2023-11-24T00:24:50.643Z (about 1 year ago)
- Topics: edr, exchange-server, hacktoberfest, iis, infosectools, powershell, windows
- Language: PowerShell
- Homepage:
- Size: 31.3 KB
- Stars: 7
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Get-RiskyProcesses
Checks running processes for a list of potentially "risky" ones that should not be spawned by certain parent processes. If found, the results could indicate abnormal behavior.
A blog post by the Microsoft Defender ATP Research Team on June 24, 2020 detailed some scenarios in which an attacker might exploit a remote code execution (RCE) vulnerability in the IIS component of an Exchange Server, and thereby gain system privileges. One indication of such an exploit might be a "cmd.exe" or "mshta.exe" process (among others) that is spawned by "w3wp.exe" or the IIS application pool. See: https://www.microsoft.com/security/blog/2020/06/24/defending-exchange-servers-under-attack/.
While Windows Defender ATP or other endpoint detection and response (EDR) products may natively be able to detect such behavior, systems without those protections may not. This script provides a working concept that could notify admins of these potential exploits, when the script is run as a scheduled task or when used in conjunction with a monitoring platform.