Rename system process and copy to suspicious location

Rename system process and copy to suspicious location

Sigma rule (View on GitHub)

 1title: Rename system process and copy to suspicious location
 2status: experimental
 3description: Rename system process and copy to suspicious location
 4author: Joe Security
 5date: 2020-09-18
 6id: 200087
 7threatname:
 8behaviorgroup: 5
 9classification: 8
10mitreattack:
11
12logsource:
13    category: process_creation
14    product: windows
15detection:
16    selection:
17        CommandLine:
18            - '*/c copy /z c:\windows\syswow64\windowspowershell\v1.0\powershell.exe c:\users*'
19            - '*/c copy /z c:\windows\syswow64\bitsadmin.exe c:\users*'
20        
21    condition: selection
22level: critical
to-top