Rename system process and copy to suspicious location
Rename system process and copy to suspicious location
Sigma rule (View on GitHub)
1title: Rename system process and copy to suspicious location
2status: experimental
3description: Rename system process and copy to suspicious location
4author: Joe Security
5date: 2020-09-18
6id: 200087
7threatname:
8behaviorgroup: 5
9classification: 8
10mitreattack:
11
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 selection:
17 CommandLine:
18 - '*/c copy /z c:\windows\syswow64\windowspowershell\v1.0\powershell.exe c:\users*'
19 - '*/c copy /z c:\windows\syswow64\bitsadmin.exe c:\users*'
20
21 condition: selection
22level: critical