Techniques
Sample rules
Potential Defense Evasion Via Rename Of Highly Relevant Binaries
- source: sigma
- technicques:- t1036
- t1036.003
 
Description
Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
Detection logic
condition: selection and not filter
filter:
  Image|endswith:
  - \certutil.exe
  - \cmstp.exe
  - \cscript.exe
  - \ie4uinit.exe
  - \mshta.exe
  - \msiexec.exe
  - \msxsl.exe
  - \powershell_ise.exe
  - \powershell.exe
  - \psexec.exe
  - \psexec64.exe
  - \PSEXESVC.exe
  - \pwsh.exe
  - \reg.exe
  - \regsvr32.exe
  - \rundll32.exe
  - \wermgr.exe
  - \wmic.exe
  - \wscript.exe
selection:
- Description: Execute processes remotely
- Product: Sysinternals PsExec
- Description|startswith:
  - Windows PowerShell
  - pwsh
- OriginalFileName:
  - certutil.exe
  - cmstp.exe
  - cscript.exe
  - IE4UINIT.EXE
  - mshta.exe
  - msiexec.exe
  - msxsl.exe
  - powershell_ise.exe
  - powershell.exe
  - psexec.c
  - psexec.exe
  - psexesvc.exe
  - pwsh.dll
  - reg.exe
  - regsvr32.exe
  - rundll32.exe
  - WerMgr
  - wmic.exe
  - wscript.exe
Potential Defense Evasion Via Binary Rename
- source: sigma
- technicques:- t1036
- t1036.003
 
Description
Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
Detection logic
condition: selection and not filter
filter:
  Image|endswith:
  - \cmd.exe
  - \conhost.exe
  - \7z.exe
  - \7za.exe
  - \WinRAR.exe
  - \wevtutil.exe
  - \net.exe
  - \net1.exe
  - \netsh.exe
  - \InstallUtil.exe
selection:
  OriginalFileName:
  - Cmd.Exe
  - CONHOST.EXE
  - 7z.exe
  - 7za.exe
  - WinRAR.exe
  - wevtutil.exe
  - net.exe
  - net1.exe
  - netsh.exe
  - InstallUtil.exe
