Skip to main content
Skip table of contents

Parent Process ID [7.2]

The Parent Process ID of a system or application process that is of interest.

This field is not available in LogRhythm versions earlier than 7.2.1.

Data Type

String (16 characters)

Aliases

UseAlias

Client Console Full Name

Parent Process ID

Client Console Short Name

Parent Process ID

Web Console Tab/Name

Application/Parent Process ID

Elasticsearch Field Name

parentProcessId

Rule Builder Column Name

ParentProcessID

Regex Pattern

<parentprocessid>

NetMon Name

Not applicable

Field Relationships

  • Parent Process Name
  • Parent Process Path
  • Process Name
  • Process ID
  • Object
  • Object Name
  • Object Type
  • Session
  • Session Type

Common Applications

  • Endpoint devices (for example, Carbon Black)
  • Windows logs

Use Case

Identifying that Office is the source for a PowerShell process that is malicious.

MPE/Data Masking Manipulations

Not applicable.

Usage Standards

Parse the most obvious meaningful parent ID, which is typically a top-level root.

Examples

  • Windows Event Log - Sysmon

<Event xmlns='http://Host3/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Sysmon' Guid='{22222222-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>1</EventID><Version>5</Version><Level>Information</Level><Task>Process Create (rule: ProcessCreate)</Task><Opcode>Info</Opcode><Keywords></Keywords><TimeCreated SystemTime='2016-09-19T17:50:20.719863700Z'/><EventRecordID>230097</EventRecordID><Correlation/><Execution ProcessID='3716' ThreadID='3740'/><Channel>Microsoft-Windows-Sysmon/Operational</Channel><Computer> USABLDRRECFLOW01</Computer><Security UserID='NT AUTHORITY\SYSTEM'/></System><EventData>Process Create:
UtcTime: 2016-09-19 17:50:20.718
ProcessGuid: {FCC7BD93-255C-57E0-0000-00109BAC260D}
ProcessId: 127228
Image: C:\Windows\System32\Host2
CommandLine: Host2 /c echo ffsuli > \\.\pipe\ffsuli
CurrentDirectory: C:\Windows\system32\
User: NT AUTHORITY\SYSTEM
LogonGuid: {FCC7BD93-8F2C-57DC-0000-22222222222}
LogonId: 0x3E7
TerminalSessionId: 0
IntegrityLevel: System
Hashes: SHA1=

811627E612944FE5DADF2A14763A08111143C27E

ParentProcessGuid: {FCC7BD93-8F2B-57DC-0000-222222222222}
ParentProcessId: 504
ParentImage: C:\Windows\System32\Host1
ParentCommandLine: C:\Windows\system32\Host1</EventData></Event>

Parent Process ID is specifically called out in this log.

  • Cb Response

08 30 2016 02:20:42 1.1.1.1 <USER:NOTE> LEEF:1.0|CB|CB|1.1.1.1623.1033|watchlist.storage.hit.process|cb_server=cbserver       cb_version=1.1.1.1623.1033 childproc_count=1   cmdline=C:\\Windows\\system32\\cmd.exe /c ping provisionserver >nul 2>nul      crossproc_count=1   filemod_count=0       host_type=workstation      last_update=2016-08-30T08:02:01.670Z    modload_count=11       netconn_count=0     os_type=windows     parent_guid=222222222-0000-2010-01d2-0294ad4c889c parent_id=2222222222       parent_name=scsdiscovery.exe     parent_pid=8208       parent_unique_id=222222-0000-2010-01d2-0294ad4c889c-2222222222       path=c:\\windows\\syswow64\\cmd.exe     process_guid=000001c3-0000-097c-01d2-222222222    process_id=000001c3-0000-097c-01d2-22222222222 process_name=cmd.exe       process_pid=2428    regmod_count=0      server_name=localhost.localdomain start=2016-08-30T08:01:24.874Z timestamp=1472548449.903   type=watchlist.storage.hit.process       unique_id=000001c3-0000-097c-01d2-22222222222-00000001      username=SYSTEM       watchlist_155=2016-08-30T09:10:02.525745Z      watchlist_id=155       watchlist_name=Command Line

Parent_pid (Process ID) called out specifically.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.