← Back to SOC feed Coverage →

Suspicious SYSTEM User Process Creation

sigma HIGH SigmaHQ
T1134T1003T1027
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-05-22T11:00:00Z · Confidence: medium

Hunt Hypothesis

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

Detection Rule

Sigma (Original)

title: Suspicious SYSTEM User Process Creation
id: 2617e7ed-adb7-40ba-b0f3-8f9945fe6c09
status: test
description: Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)
references:
    - Internal Research
    - https://tools.thehacker.recipes/mimikatz/modules
author: Florian Roth (Nextron Systems), David ANDRE (additional keywords)
date: 2021-12-20
modified: 2025-10-19
tags:
    - attack.credential-access
    - attack.privilege-escalation
    - attack.stealth
    - attack.t1134
    - attack.t1003
    - attack.t1027
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        IntegrityLevel:
            - 'System'
            - 'S-1-16-16384'
        User|contains: # covers many language settings
            - 'AUTHORI'
            - 'AUTORI'
    selection_special:
        - Image|endswith:
              - '\calc.exe'
              - '\cscript.exe'
              - '\forfiles.exe'
              - '\hh.exe'
              - '\mshta.exe'
              - '\ping.exe'
              - '\wscript.exe'
        - CommandLine|re: 'net\s+user\s+'
        - CommandLine|contains:
              # - 'sc stop ' # stops a system service # causes FPs
              - ' -NoP '  # Often used in malicious PowerShell commands
              - ' -W Hidden '  # Often used in malicious PowerShell commands
              - ' -decode '  # Used with certutil
              - ' /decode '  # Used with certutil
              - ' /urlcache '  # Used with certutil
              - ' -urlcache '  # Used with certutil
              - ' -e* JAB'  # PowerShell encoded commands
              - ' -e* SUVYI'  # PowerShell encoded commands
              - ' -e* SQBFAFgA'  # PowerShell encoded commands
              - ' -e* aWV4I'  # PowerShell encoded commands
              - ' -e* IAB'  # PowerShell encoded commands
              - ' -e* PAA'  # PowerShell encoded commands
              - ' -e* aQBlAHgA'  # PowerShell encoded commands
              - 'vssadmin delete shadows'  # Ransomware
              - 'reg SAVE HKLM'  # save registry SAM - syskey extraction
              - ' -ma '  # ProcDump
              - 'Microsoft\Windows\CurrentVersion\Run'  # Run key in command line - often in combination with REG ADD
              - '.downloadstring('  # PowerShell download command
              - '.downloadfile('  # PowerShell download command
              - ' /ticket:'  # Rubeus
              - 'dpapi::'     # Mimikatz
              - 'event::clear'        # Mimikatz
              - 'event::drop'     # Mimikatz
              - 'id::modify'      # Mimikatz
              - 'kerberos::'       # Mimikatz
              - 'lsadump::'      # Mimikatz
              - 'misc::'     # Mimikatz
              - 'privilege::'       # Mimikatz
              - 'rpc::'      # Mimikatz
              - 'sekurlsa::'       # Mimikatz
              - 'sid::'        # Mimikatz
              - 'token::'      # Mimikatz
              - 'vault::cred'     # Mimikatz
              - 'vault::list'     # Mimikatz
              - ' p::d '  # Mimikatz
              - ';iex('  # PowerShell IEX
              - 'MiniDump'  # Process dumping method apart from procdump
    filter_main_ping:
        CommandLine|contains|all:
            - 'ping'
            - '127.0.0.1'
            - ' -n '
    filter_vs:
        Image|endswith: '\PING.EXE'
        ParentCommandLine|contains: '\DismFoDInstall.cmd'
    filter_config_mgr:
        ParentImage|contains: ':\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows\'
    filter_java:
        ParentImage|contains:
            - ':\Program Files (x86)\Java\'
            - ':\Program Files\Java\'
        ParentImage|endswith: '\bin\javaws.exe'
        Image|contains:
            - ':\Program Files (x86)\Java\'
            - ':\Program Files\Java\'
        Image|endswith: '\bin\jp2launcher.exe'
        CommandLine|contains: ' -ma '
    condition: all of selection* and not 1 of filter_*
falsepositives:
    - Administrative activity
    - Scripts and administrative tools used in the monitored environment
    - Monitoring activity
level: high

KQL (Azure Sentinel)

imProcessCreate
| where (((TargetProcessIntegrityLevel in~ ("System", "S-1-16-16384")) and (TargetUsername contains "AUTHORI" or TargetUsername contains "AUTORI")) and ((TargetProcessName endswith "\\calc.exe" or TargetProcessName endswith "\\cscript.exe" or TargetProcessName endswith "\\forfiles.exe" or TargetProcessName endswith "\\hh.exe" or TargetProcessName endswith "\\mshta.exe" or TargetProcessName endswith "\\ping.exe" or TargetProcessName endswith "\\wscript.exe") or TargetProcessCommandLine matches regex "net\\s+user\\s+" or (TargetProcessCommandLine contains " -NoP " or TargetProcessCommandLine contains " -W Hidden " or TargetProcessCommandLine contains " -decode " or TargetProcessCommandLine contains " /decode " or TargetProcessCommandLine contains " /urlcache " or TargetProcessCommandLine contains " -urlcache " or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " JAB") or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " SUVYI") or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " SQBFAFgA") or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " aWV4I") or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " IAB") or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " PAA") or (TargetProcessCommandLine contains " -e" and TargetProcessCommandLine contains " aQBlAHgA") or TargetProcessCommandLine contains "vssadmin delete shadows" or TargetProcessCommandLine contains "reg SAVE HKLM" or TargetProcessCommandLine contains " -ma " or TargetProcessCommandLine contains "Microsoft\\Windows\\CurrentVersion\\Run" or TargetProcessCommandLine contains ".downloadstring(" or TargetProcessCommandLine contains ".downloadfile(" or TargetProcessCommandLine contains " /ticket:" or TargetProcessCommandLine contains "dpapi::" or TargetProcessCommandLine contains "event::clear" or TargetProcessCommandLine contains "event::drop" or TargetProcessCommandLine contains "id::modify" or TargetProcessCommandLine contains "kerberos::" or TargetProcessCommandLine contains "lsadump::" or TargetProcessCommandLine contains "misc::" or TargetProcessCommandLine contains "privilege::" or TargetProcessCommandLine contains "rpc::" or TargetProcessCommandLine contains "sekurlsa::" or TargetProcessCommandLine contains "sid::" or TargetProcessCommandLine contains "token::" or TargetProcessCommandLine contains "vault::cred" or TargetProcessCommandLine contains "vault::list" or TargetProcessCommandLine contains " p::d " or TargetProcessCommandLine contains ";iex(" or TargetProcessCommandLine contains "MiniDump"))) and (not(((TargetProcessCommandLine contains "ping" and TargetProcessCommandLine contains "127.0.0.1" and TargetProcessCommandLine contains " -n ") or (TargetProcessName endswith "\\PING.EXE" and ActingProcessCommandLine contains "\\DismFoDInstall.cmd") or (ParentProcessName contains ":\\Packages\\Plugins\\Microsoft.GuestConfiguration.ConfigurationforWindows\\" or ActingProcessName contains ":\\Packages\\Plugins\\Microsoft.GuestConfiguration.ConfigurationforWindows\\") or (((ParentProcessName contains ":\\Program Files (x86)\\Java\\" or ParentProcessName contains ":\\Program Files\\Java\\") or (ActingProcessName contains ":\\Program Files (x86)\\Java\\" or ActingProcessName contains ":\\Program Files\\Java\\")) and (ParentProcessName endswith "\\bin\\javaws.exe" or ActingProcessName endswith "\\bin\\javaws.exe") and (TargetProcessName contains ":\\Program Files (x86)\\Java\\" or TargetProcessName contains ":\\Program Files\\Java\\") and TargetProcessName endswith "\\bin\\jp2launcher.exe" and TargetProcessCommandLine contains " -ma "))))

Required Data Sources

Sentinel TableNotes
imProcessCreateEnsure this data connector is enabled

False Positive Guidance

MITRE ATT&CK Context

References

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_system_user_anomaly.yml