Suspicious Process Execution Investigation
When XDR or EDR alerts on suspicious process execution, unusual parent-child relationships, encoded command lines, or processes spawning from unexpected locations, investigate by analyzing the full process tree, checking the binary hash against threat intelligence, examining command-line arguments for malicious intent, and determining if the execution is part of a larger attack chain. Look at what happened before and after the process executed.
Overview
Suspicious process execution alerts are generated when endpoint detection tools observe process behavior that deviates from normal baselines. These alerts range from obvious malware execution to subtle living-off-the-land techniques where attackers abuse legitimate system tools.
The challenge for SOC analysts is determining whether the process execution is malicious, part of legitimate administration, or a software update. This playbook teaches you to analyze process trees, decode obfuscated commands, and correlate endpoint activity to make accurate triage decisions.
When You See This
- 1
XDR alert for unusual parent-child process relationships (e.g., Word spawning PowerShell)
- 2
Encoded PowerShell command execution (Base64 encoded, -EncodedCommand flag)
- 3
Process execution from temporary directories, user profile folders, or recycle bin
- 4
LOLBAS/LOLBin abuse: legitimate tools used in unusual ways (certutil downloading files, mshta running scripts)
Investigation Steps
- 1
Analyze the full process tree
Examine the complete process ancestry: grandparent → parent → suspicious process → child processes. The parent process is critical context. Word spawning PowerShell is highly suspicious. Explorer spawning PowerShell is less concerning. Document the entire chain.
XDRindex=endpoint dest_host="affected_host" process_id="suspicious_pid" | table _time, parent_process_name, parent_process_id, process_name, process_id, command_line, user
- 2
Check binary reputation and hash
Look up the process hash (SHA256) against threat intelligence. Check if the binary is signed, and if so, by whom. Verify the binary location matches where it should be installed. Legitimate system tools in unusual locations are a red flag.
XDRindex=endpoint process_hash="suspicious_hash" | stats count by dest_host, process_path, is_signed, signer
Decision Point
If: Hash matches known malware in threat intelligence
Yes → Confirmed malicious. Isolate the endpoint immediately and escalate. Search all endpoints for the same hash.
No → Not in threat intel; does not mean it is safe. Continue analyzing the command line and behavior.
- 3
Decode and analyze command-line arguments
If the command line is encoded (Base64 PowerShell, obfuscated batch scripts), decode it to understand the actual intent. Look for download cradles, reverse shells, credential access tools, or reconnaissance commands.
XDRSIEMindex=endpoint process_name="powershell.exe" command_line="*-enc*" OR command_line="*-EncodedCommand*" | table _time, dest_host, user, command_line
- 4
Determine context: what happened before and after
Look at what triggered the process (email delivery? web download? scheduled task?) and what it did next (network connections? file creation? registry modifications?). This context determines whether this is isolated or part of an attack chain.
XDRSIEM - 5
Triage and respond
Based on your analysis, classify as true positive (malicious), false positive (legitimate), or suspicious (needs further investigation). For true positives, isolate the endpoint, block the hash environment-wide, and escalate. For false positives, tune the detection rule to reduce noise.
XDR
Common Mistakes
- 1
Looking at the process in isolation without examining the parent process and full tree
- 2
Assuming a signed binary is safe; attackers abuse legitimate signed tools (living-off-the-land)
- 3
Not decoding obfuscated command lines, missing the actual malicious intent
- 4
Closing an alert as false positive without checking if the same process ran on other endpoints
Escalation Criteria
Process hash matches known malware in threat intelligence
Decoded command line reveals credential harvesting, reverse shell, or data exfiltration
Process is part of a chain that includes lateral movement or privilege escalation
Practice This Investigation
SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including suspicious process execution investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.
Frequently Asked Questions
- What are the most common false positives for process execution alerts?
- Software updates that spawn PowerShell or command prompt, IT admin tools running scheduled maintenance scripts, and developer tools that create unusual process trees. Document known-good patterns and work with your detection engineering team to tune rules.
- What is living-off-the-land (LOTL)?
- Living-off-the-land is when attackers use legitimate system tools (PowerShell, certutil, mshta, wmic) for malicious purposes instead of dropping custom malware. It is harder to detect because the tools themselves are trusted; you must analyze HOW they are being used.
- How do I practice process execution investigations?
- SOCSimulator XDR training console generates realistic process execution alerts with full process trees. Practice analyzing parent-child relationships and decoding obfuscated commands. Start free forever.
Related SOC Training Resources
Command and Scripting Interpreter (T1059) — Detection Training
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and la…
Read more TechniqueUser Execution (T1204) — Detection Training
An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engin…
Read more TechniqueProcess Injection (T1055) — Detection Training
Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileg…
Read more TechniqueSystem Binary Proxy Execution (T1218) — Detection Training
Adversaries may bypass process and or signature-based defenses by proxying execution of malicious content with signed, o…
Read more GlossaryWhat is EDR? — SOC Glossary
Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…
Read more GlossaryWhat is IOC? — SOC Glossary
An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …
Read more GlossaryWhat is Threat Hunting? — SOC Glossary
Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…
Read more GlossaryWhat is TTPs? — SOC Glossary
Tactics, Techniques, and Procedures (TTPs) describe the behavioral patterns, methods, and operational processes threat a…
Read more Career PathSOC Analyst (Tier 2) Career Guide — Salary & Skills
Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…
Read more Career PathIncident Responder Career Guide — Salary & Skills
Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…
Read more ComparisonSOCSimulator vs LetsDefend — Comparison
SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…
Read more ComparisonSOCSimulator vs TryHackMe — Comparison
SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…
Read more