Browser Spawns Shell Process - Possible Unpatched App Exploitation (E8-02)

E8-02 — Patch Applications ML1 high experimental
More E8-02 rules
Description
Detects a web browser (Chrome, Firefox, Edge) spawning a shell or scripting process — the classic indicator of browser exploit or malicious web content executing arbitrary code. E8-02 (Patch Applications) focuses on keeping browsers patched; this rule detects what happens when patching fails or is delayed beyond the maturity level window.
Rule Source (Sigma YAML)
title: Browser Spawns Shell Process - Possible Unpatched App Exploitation (E8-02)
id: 04d5168f-934f-4dc1-9967-51cfac6110ec
status: experimental
description: |
    Detects a web browser (Chrome, Firefox, Edge) spawning a shell or scripting
    process — the classic indicator of browser exploit or malicious web content
    executing arbitrary code. E8-02 (Patch Applications) focuses on keeping
    browsers patched; this rule detects what happens when patching fails or is
    delayed beyond the maturity level window.
references:
    - https://attack.mitre.org/techniques/T1203/
    - https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model
author: Roni Biju
date: 2026-03-21
modified: 2026-03-21
tags:
    - e8.control.02
    - e8.maturity.ml1
    - attack.execution
    - attack.t1203
    - attack.initial_access
logsource:
    category: process_creation
    product: windows
detection:
    selection_parent_browser:
        ParentImage|endswith:
            - '\chrome.exe'
            - '\firefox.exe'
            - '\msedge.exe'
            - '\iexplore.exe'
            - '\opera.exe'
            - '\brave.exe'
    selection_child_shell:
        Image|endswith:
            - '\cmd.exe'
            - '\powershell.exe'
            - '\pwsh.exe'
            - '\wscript.exe'
            - '\cscript.exe'
            - '\mshta.exe'
            - '\certutil.exe'
    filter_known_browser_helper:
        # Chrome/Edge spawn helper processes that look like children
        CommandLine|contains:
            - '--type=renderer'
            - '--type=gpu-process'
            - '--type=utility'
    condition: selection_parent_browser and selection_child_shell and not filter_known_browser_helper
falsepositives:
    - Browser-based management consoles that launch local tools
    - Click-once applications launched via browser
    - Electron apps with integrated browser
level: high
custom:
    e8_control: E8-02
    e8_maturity: ML1
    e8_bypass_technique: Browser exploit or malicious web content spawning shell
    false_positive_rate: low
    tuning_notes: |
        Extremely high-fidelity on modern patched browsers. Filter by specific
        browser versions if telemetry includes that field. If firing on Electron
        apps, suppress by ParentCommandLine containing '--app=' flag.
Tuning Notes
Extremely high-fidelity on modern patched browsers. Filter by specific browser versions if telemetry includes that field. If firing on Electron apps, suppress by ParentCommandLine containing '--app=' flag.
E8 Control
Min. Maturity
ML1
Severity
high
FP Rate
low
Log Source
windows / process_creation
Rule ID
04d5168f-934f-4dc1-9967-51cfac6110ec
File
rules/e8-02-patch-applications/e8_02_browser_spawns_shell.yml
Bypass Technique
Browser exploit or malicious web content spawning shell
ATT&CK Techniques
False Positives
  • Browser-based management consoles that launch local tools
  • Click-once applications launched via browser
  • Electron apps with integrated browser