title: Suspicious ftp.exe ruletype: Sigma author: Victor Sergeev, oscd.community date: 2020/10/09 description: Detects renamed ftp.exe, ftp.exe script execution and child processes ran by ftp.exe detection: SELECTION_1: EventID: 1 SELECTION_2: CommandLine: '*-s:*' SELECTION_3: Image: '*ftp.exe' SELECTION_4: OriginalFileName: '*ftp.exe*' SELECTION_5: OriginalFileName: '*ftp.exe*' SELECTION_6: Image: '*ftp.exe' SELECTION_7: ParentImage: '*ftp.exe' condition: (SELECTION_1 and ((SELECTION_2 and (SELECTION_3 or SELECTION_4)) or (SELECTION_5 and not (SELECTION_6)) or SELECTION_7)) falsepositives: - Unknown fields: - CommandLine - ParentImage id: 06b401f4-107c-4ff9-947f-9ec1e7649f1e level: medium logsource: category: process_creation product: windows modified: 2021/11/27 references: - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Ftp.yml status: test tags: - attack.execution - attack.t1059 - attack.defense_evasion - attack.t1202