Process Injection - Detected - Elastic Endpoint Securityedit

Elastic Endpoint Security detected Process Injection. Click the Elastic Endpoint Security icon in the event.module column or the link in the rule.reference column for additional information.

Rule type: query

Rule indices:

  • endgame-*

Severity: high

Risk score: 73

Runs every: 10 minutes

Searches indices from: now-15m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

Tags:

  • Elastic
  • Endpoint

Version: 3 (version history)

Added (Elastic Stack release): 7.6.0

Last modified (Elastic Stack release): 7.9.0

Rule authors: Elastic

Rule license: Elastic License

Rule queryedit

event.kind:alert and event.module:endgame and
endgame.metadata.type:detection and
(event.action:kernel_shellcode_event or
endgame.event_subtype_full:kernel_shellcode_event)

Rule version historyedit

Version 3 (7.9.0 release)
  • Rule name changed from: Process Injection - Detected - Elastic Endpoint
Version 2 (7.7.0 release)
  • Updated query, changed from:

    event.kind:alert and event.module:endgame and
    event.action:kernel_shellcode_event and
    endgame.metadata.type:detection