Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_renamed_debugview.yml
T
Nasreddine Bencherchali 27aac97639 feat: updates and enhancements
2023-02-14 00:51:20 +01:00

26 lines
679 B
YAML

title: Renamed SysInternals DebugView Execution
id: cd764533-2e07-40d6-a718-cfeec7f2da7f
status: test
description: Detects suspicious renamed SysInternals DebugView execution
references:
- https://www.epicturla.com/blog/sysinturla
author: Florian Roth (Nextron Systems)
date: 2020/05/28
modified: 2023/02/14
tags:
- attack.resource_development
- attack.t1588.002
logsource:
category: process_creation
product: windows
detection:
selection:
Product: 'Sysinternals DebugView'
filter:
OriginalFileName: 'Dbgview.exe'
Image|endswith: '\Dbgview.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high