Event Details
Operating System->Microsoft Windows->Application logs->Sysinternals->Microsoft-Windows-Sysmon/Operational->EventID 8 - CreateRemoteThread detected
EventID 8 - CreateRemoteThread detected
 Sample:
CreateRemoteThread detected:
    RuleName: %1!s!
    UtcTime: %2!s!
    SourceProcessGuid: %3!s!
    SourceProcessId: %4!s!
    SourceImage: %5!s!
    TargetProcessGuid: %6!s!
    TargetProcessId: %7!s!
    TargetImage: %8!s!
    NewThreadId: %9!s!
    StartAddress: %10!s!
    StartModule: %11!s!
    StartFunction: %12!s!
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Microsoft-Windows-Sysmon/Operational
Filtering Field Equals to Value
EventId 8
Field Matching
FieldDescriptionStored inSample Value
DateTime Date/Time of event origination in GMT format. DateTime 10.10.2000 19:00:00
Source Name of an Application or System Service originating the event. Source Security
Type Warning, Information, Error, Success, Failure, etc. Type Success
User Domain\Account name of user/service/computer initiating event. User RESEARCH\Alebovsky
Computer Name of server workstation where event was logged. Computer DC1
EventID Numerical ID of event. Unique within one Event Source. EventId 576
Description The entire unparsed event message. Description Special privileges assigned to new logon.
Log Name The name of the event log (e.g. Application, Security, System, etc.) LogName Security
Process ID InsertionString4
Process Name InsertionString5
Image File Name InsertionString5
Comments
You must be logged in to comment