Process Termination

The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.

Data Collection Measures:

  • Endpoint Detection and Response (EDR) Tools:
    • Monitor process termination events.
  • Windows Event Logs:
    • Event ID 4689 (Process Termination) – Captures when a process exits, including process ID and parent process.
    • Event ID 7036 (Service Control Manager) – Monitors system service stops.
  • Sysmon (Windows):
    • Event ID 5 (Process Termination) – Detects when a process exits, including parent-child relationships.
  • Linux/macOS Monitoring:
    • AuditD (execve, exit_group, kill syscalls) – Captures process termination via command-line interactions.
    • eBPF/XDP: Monitors low-level system calls related to process termination.
    • OSQuery: The processes table can be queried for abnormal exits.
ID: DC0033
Domains: ICS, Mobile, Enterprise
Version: 2.0
Created: 20 October 2021
Last Modified: 21 October 2025

Log Sources

Name Channel
auditd:SYSCALL exit_group
auditd:SYSCALL Process segfault or abnormal termination after invoking vulnerable syscall sequence
auditd:SYSCALL kill syscalls targeting logging/security processes
docker:runtime Termination of monitoring sidecar or security container
esxi:hostd Log entries indicating VM powered off or forcibly terminated
linux:osquery unexpected termination of syslog or rsyslog processes
linux:syslog Unexpected termination of daemons or critical services not aligned with admin change tickets
macos:osquery process_termination: Unexpected termination of processes tied to vulnerable or high-value services
macos:unifiedlog Terminal process killed (killall Terminal) immediately after sudoers modification
macos:unifiedlog process.*exit.*code
macos:unifiedlog Termination of syspolicyd or XProtect processes
Process None
WinEventLog:Sysmon EventCode=5

Detection Strategy