Files
hayabusa/rules/sigma/process_creation/win_renamed_binary.yml
itiB 83d891b2fa Feature/rm submodule (#312)
* rm: submodule

* Add: rules

* Fix: hayabusa-rules to c9c10a
2021-12-20 21:14:32 +09:00

77 lines
1.8 KiB
YAML

title: Renamed Binary
ruletype: Sigma
author: Matthew Green - @mgreen27, Ecco, James Pemberton / @4A616D6573, oscd.community
(improvements), Andreas Hunkeler (@Karneades)
date: 2019/06/15
description: Detects the execution of a renamed binary often used by attackers or
malware leveraging new Sysmon OriginalFileName datapoint.
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
OriginalFileName:
- cmd.exe
- CONHOST.EXE
- powershell.exe
- powershell_ise.exe
- psexec.exe
- psexec.c
- cscript.exe
- wscript.exe
- mshta.exe
- regsvr32.exe
- wmic.exe
- certutil.exe
- rundll32.exe
- cmstp.exe
- msiexec.exe
- 7z.exe
- winrar.exe
- wevtutil.exe
- net.exe
- net1.exe
- netsh.exe
SELECTION_3:
Image:
- '*\cmd.exe'
- '*\conhost.exe'
- '*\powershell.exe'
- '*\powershell_ise.exe'
- '*\psexec.exe'
- '*\psexec64.exe'
- '*\cscript.exe'
- '*\wscript.exe'
- '*\mshta.exe'
- '*\regsvr32.exe'
- '*\wmic.exe'
- '*\certutil.exe'
- '*\rundll32.exe'
- '*\cmstp.exe'
- '*\msiexec.exe'
- '*\7z.exe'
- '*\winrar.exe'
- '*\wevtutil.exe'
- '*\net.exe'
- '*\net1.exe'
- '*\netsh.exe'
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3))
falsepositives:
- Custom applications use renamed binaries adding slight change to binary name. Typically
this is easy to spot and add to whitelist
id: 36480ae1-a1cb-4eaa-a0d6-29801d7e9142
level: medium
logsource:
category: process_creation
product: windows
modified: 2021/12/01
references:
- https://attack.mitre.org/techniques/T1036/
- https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html
- https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html
status: test
tags:
- attack.defense_evasion
- attack.t1036
- attack.t1036.003