Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_lolbas_replace.yml
T
2022-03-16 13:43:54 +01:00

23 lines
568 B
YAML

title: Suspicious Replace.exe Execution
id: 9292293b-8496-4715-9db6-37028dcda4b3
status: experimental
description: Replace.exe is used to replace file with another file
references:
- https://lolbas-project.github.io/lolbas/Binaries/Replace/
author: frack113
date: 2022/03/06
logsource:
category: process_creation
product: windows
detection:
lolbas:
CommandLine|contains|all:
- 'replace '
- '/A'
condition: lolbas
falsepositives:
- Unknown
level: medium
tags:
- attack.command_and_control
- attack.t1105