2019-06-15 20:19:35 +10:00
|
|
|
title: Renamed Binary
|
2019-11-12 23:12:27 +01:00
|
|
|
id: 36480ae1-a1cb-4eaa-a0d6-29801d7e9142
|
2021-11-27 11:33:14 +01:00
|
|
|
status: test
|
2019-06-15 20:20:52 +10:00
|
|
|
description: Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
|
2020-04-20 17:12:25 +02:00
|
|
|
author: Matthew Green - @mgreen27, Ecco, James Pemberton / @4A616D6573, oscd.community (improvements), Andreas Hunkeler (@Karneades)
|
2019-06-15 20:19:35 +10:00
|
|
|
references:
|
2021-11-27 11:33:14 +01:00
|
|
|
- https://attack.mitre.org/techniques/T1036/
|
|
|
|
|
- https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html
|
|
|
|
|
- https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html
|
|
|
|
|
date: 2019/06/15
|
2022-07-14 17:35:50 +01:00
|
|
|
modified: 2022/07/14
|
2019-06-15 20:19:35 +10:00
|
|
|
logsource:
|
2021-11-27 11:33:14 +01:00
|
|
|
category: process_creation
|
|
|
|
|
product: windows
|
2019-06-15 20:19:35 +10:00
|
|
|
detection:
|
2021-11-27 11:33:14 +01:00
|
|
|
selection:
|
|
|
|
|
OriginalFileName:
|
2022-06-28 22:21:46 +01:00
|
|
|
- 'Cmd.Exe'
|
2021-12-01 15:07:06 +11:00
|
|
|
- 'CONHOST.EXE'
|
2022-06-28 22:21:46 +01:00
|
|
|
- 'PowerShell.EXE'
|
2022-07-14 17:35:50 +01:00
|
|
|
- 'pwsh.dll'
|
2022-06-28 22:21:46 +01:00
|
|
|
- 'powershell_ise.EXE'
|
2021-11-27 11:33:14 +01:00
|
|
|
- 'psexec.exe'
|
|
|
|
|
- 'psexec.c' # old versions of psexec (2016 seen)
|
|
|
|
|
- 'cscript.exe'
|
|
|
|
|
- 'wscript.exe'
|
2022-06-28 22:21:46 +01:00
|
|
|
- 'MSHTA.EXE'
|
|
|
|
|
- 'REGSVR32.EXE'
|
2021-11-27 11:33:14 +01:00
|
|
|
- 'wmic.exe'
|
2022-06-28 22:21:46 +01:00
|
|
|
- 'CertUtil.exe'
|
|
|
|
|
- 'RUNDLL32.EXE'
|
|
|
|
|
- 'CMSTP.EXE'
|
2021-11-27 11:33:14 +01:00
|
|
|
- 'msiexec.exe'
|
|
|
|
|
- '7z.exe'
|
2022-06-28 22:21:46 +01:00
|
|
|
- 'WinRAR.exe'
|
2021-11-27 11:33:14 +01:00
|
|
|
- 'wevtutil.exe'
|
|
|
|
|
- 'net.exe'
|
|
|
|
|
- 'net1.exe'
|
|
|
|
|
- 'netsh.exe'
|
|
|
|
|
filter:
|
|
|
|
|
Image|endswith:
|
|
|
|
|
- '\cmd.exe'
|
2021-12-01 15:07:06 +11:00
|
|
|
- '\conhost.exe'
|
2021-11-27 11:33:14 +01:00
|
|
|
- '\powershell.exe'
|
2022-07-14 17:35:50 +01:00
|
|
|
- '\pwsh.exe'
|
2021-11-27 11:33:14 +01:00
|
|
|
- '\powershell_ise.exe'
|
|
|
|
|
- '\psexec.exe'
|
|
|
|
|
- '\psexec64.exe'
|
|
|
|
|
- '\cscript.exe'
|
|
|
|
|
- '\wscript.exe'
|
|
|
|
|
- '\mshta.exe'
|
|
|
|
|
- '\regsvr32.exe'
|
2022-06-28 22:21:46 +01:00
|
|
|
- '\WMIC.exe'
|
2021-11-27 11:33:14 +01:00
|
|
|
- '\certutil.exe'
|
|
|
|
|
- '\rundll32.exe'
|
|
|
|
|
- '\cmstp.exe'
|
|
|
|
|
- '\msiexec.exe'
|
|
|
|
|
- '\7z.exe'
|
2022-06-28 22:21:46 +01:00
|
|
|
- '\WinRAR.exe'
|
2021-11-27 11:33:14 +01:00
|
|
|
- '\wevtutil.exe'
|
|
|
|
|
- '\net.exe'
|
|
|
|
|
- '\net1.exe'
|
|
|
|
|
- '\netsh.exe'
|
|
|
|
|
condition: selection and not filter
|
2019-06-15 20:19:35 +10:00
|
|
|
falsepositives:
|
2021-11-27 11:33:14 +01:00
|
|
|
- Custom applications use renamed binaries adding slight change to binary name. Typically this is easy to spot and add to whitelist
|
2022-06-28 22:21:46 +01:00
|
|
|
- PsExec installed via Windows Store doesn't contain original filename field (False negative)
|
2019-06-20 00:03:48 +02:00
|
|
|
level: medium
|
2021-11-27 11:33:14 +01:00
|
|
|
tags:
|
|
|
|
|
- attack.defense_evasion
|
|
|
|
|
- attack.t1036.003
|