T1588.005

Exploits

Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than developing their own exploits, an adversary may find, modify, or purchase exploits from online sources, exploit vendors, criminal marketplaces (including exploit kits), or from other threat actors. Adversaries such as Ember Bear have obtained exploitation scripts against publicly-disclosed vulnerabilities from public repositories, while Kimsuky has obtained exploit code for various CVEs. Acquired exploits may be used across multiple phases of the adversary lifecycle including initial access, privilege escalation, defense evasion, credential access, and lateral movement. Because the acquisition of exploits occurs entirely on adversary-controlled infrastructure, direct detection is not possible from victim telemetry — detection must focus on observable indicators when those acquired exploits are deployed.

Microsoft Sentinel / Defender
kusto
let ExploitableApplications = dynamic([
    "winword.exe", "excel.exe", "powerpnt.exe", "outlook.exe",
    "mspub.exe", "onenote.exe", "msaccess.exe",
    "acrord32.exe", "acrobat.exe",
    "chrome.exe", "firefox.exe", "msedge.exe", "iexplore.exe",
    "java.exe", "javaw.exe", "javaws.exe"
]);
let SuspiciousChildProcesses = dynamic([
    "cmd.exe", "powershell.exe", "pwsh.exe",
    "wscript.exe", "cscript.exe", "mshta.exe",
    "rundll32.exe", "regsvr32.exe", "certutil.exe",
    "bitsadmin.exe", "msiexec.exe", "wmic.exe",
    "msbuild.exe", "installutil.exe", "regasm.exe",
    "regsvcs.exe", "schtasks.exe"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName has_any (ExploitableApplications)
| where FileName has_any (SuspiciousChildProcesses)
| extend HasNetworkIndicator = ProcessCommandLine has_any (
    "http://", "https://", "ftp://",
    "Invoke-WebRequest", "Net.WebClient", "DownloadString", "DownloadFile",
    "Start-BitsTransfer", "curl ", "wget "
)
| extend HasCredentialAccess = ProcessCommandLine has_any (
    "mimikatz", "lsass", "sekurlsa", "ntds", "procdump",
    "comsvcs", "MiniDump", "vaultcmd", "credential"
)
| extend HasPersistence = ProcessCommandLine has_any (
    "schtasks", "reg add", "\\CurrentVersion\\Run",
    "startup", "userinit", "sc create", "sc config"
)
| extend HasLateralMovement = ProcessCommandLine has_any (
    "psexec", "wmiexec", "winrm", "net use",
    "Enter-PSSession", "Invoke-Command", "ssh "
)
| extend ExploitScore = toint(HasNetworkIndicator) + toint(HasCredentialAccess)
    + toint(HasPersistence) + toint(HasLateralMovement) + 1
| project
    Timestamp, DeviceName, AccountName,
    ExploitableParent = InitiatingProcessFileName,
    ParentCmdLine = InitiatingProcessCommandLine,
    SuspiciousChild = FileName,
    ChildCmdLine = ProcessCommandLine,
    HasNetworkIndicator, HasCredentialAccess, HasPersistence, HasLateralMovement,
    ExploitScore
| sort by ExploitScore desc, Timestamp desc
high severity medium confidence

Data Sources

Process: Process Creation Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • Office macros used in legitimate business automation (e.g., Excel VBA launching cmd.exe for data pipeline exports, report generation, or ERP integrations)
  • Browser helper objects, enterprise browser extensions, or Single Sign-On agents that legitimately spawn child processes for print, download, clipboard, or authentication workflows
  • PDF processing integrations where Acrobat invokes system utilities for digital signature workflows, document conversion pipelines, or secure print operations
  • Java-based enterprise applications (ERP, HR, financial systems) that legitimately spawn system commands for file operations, external tool invocation, or OS-level integration tasks

Unlock Pro Content

Get the full detection package for T1588.005 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections