T1203

Exploitation for Client Execution

Adversaries may exploit software vulnerabilities in client applications to execute code. This includes browser-based exploitation via drive-by compromise or spearphishing links, Office application exploitation through malicious attachments (CVE-2017-11882, CVE-2017-0262, CVE-2021-40444), and third-party application exploitation (Adobe Reader, Flash). These exploits cause vulnerable client software to execute attacker-controlled code, often spawning unexpected child processes or injecting shellcode into memory.

Microsoft Sentinel / Defender
kusto
let OfficeApps = dynamic(["winword.exe", "excel.exe", "powerpnt.exe", "outlook.exe", "mspub.exe", "visio.exe", "onenote.exe", "msaccess.exe"]);
let BrowserApps = dynamic(["chrome.exe", "firefox.exe", "msedge.exe", "iexplore.exe", "opera.exe", "brave.exe"]);
let PDFApps = dynamic(["acrord32.exe", "acrobat.exe", "foxit reader.exe", "foxitpdfeditor.exe", "sumatrapdf.exe"]);
let SuspiciousChildren = dynamic([
  "cmd.exe", "powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe",
  "mshta.exe", "rundll32.exe", "regsvr32.exe", "certutil.exe", "bitsadmin.exe",
  "msbuild.exe", "installutil.exe", "regasm.exe", "regsvcs.exe",
  "schtasks.exe", "at.exe", "wmic.exe", "msiexec.exe"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName has_any (OfficeApps)
      or InitiatingProcessFileName has_any (BrowserApps)
      or InitiatingProcessFileName has_any (PDFApps)
| where FileName has_any (SuspiciousChildren)
| extend ExploitVector = case(
    InitiatingProcessFileName has_any (OfficeApps), "Office Application",
    InitiatingProcessFileName has_any (BrowserApps), "Browser",
    InitiatingProcessFileName has_any (PDFApps), "PDF Reader",
    "Other"
  )
| extend HighRisk = FileName in~ ("powershell.exe", "pwsh.exe", "mshta.exe", "regsvr32.exe", "rundll32.exe", "wscript.exe", "cscript.exe")
| project Timestamp, DeviceName, AccountName, ExploitVector,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         FileName, ProcessCommandLine, FolderPath, HighRisk,
         InitiatingProcessParentFileName
| sort by Timestamp desc
critical severity high confidence

Data Sources

Process: Process Creation Microsoft Defender for Endpoint Command: Command Execution

Required Tables

DeviceProcessEvents

False Positives

  • Office macros legitimately launching PowerShell or cmd.exe for automation tasks (SCCM, IT scripts embedded in documents)
  • Browser helper objects or extensions that spawn child processes for download handling or media playback
  • PDF readers launching external viewers or handlers for embedded attachments (e.g., opening an Excel file embedded in a PDF)
  • Equation Editor (eqnedt32.exe) being spawned during legitimate document rendering on older Office versions
  • Developer tools or IDE integrations within browsers that spawn terminal processes

Unlock Pro Content

Get the full detection package for T1203 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections