Process Creation without .exe File Extension
Detects process creations where the Image does not have a .exe file extension.
Sigma rule (View on GitHub)
1title: Process Creation without .exe File Extension
2id: 02dc3892-2fd0-4dd5-b2d7-62052a837abe
3status: experimental
4description: Detects process creations where the Image does not have a .exe file extension.
5references:
6 - https://vblocalhost.com/uploads/VB2021-Kayal-etal.pdf
7author: Micah Babinski
8date: 2022/12/11
9tags:
10 - attack.defense_evasion
11 - attack.t1036.003
12 - attack.t1036
13 - attack.s1020
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 Image|endswith: '.exe'
20 condition: not selection
21falsepositives:
22 - Unknown
23level: high```
References
Related rules
- Command or Scripting Interpreter Creating EXE File
- File Creation of Executables in Temp Folders (Event 4663)
- Unexpected Internal Process Name
- Process Executing with Unusual Command Lines
- Process Executing with Unusual Command Lines