WinSxS Executable File Creation By Non-System Process
Detects the creation of binaries in the WinSxS folder by non-system processes
Sigma rule (View on GitHub)
1title: WinSxS Executable File Creation By Non-System Process
2id: 34746e8c-5fb8-415a-b135-0abc167e912a
3related:
4 - id: 64827580-e4c3-4c64-97eb-c72325d45399
5 type: derived
6status: test
7description: Detects the creation of binaries in the WinSxS folder by non-system processes
8references:
9 - https://media.defense.gov/2023/May/09/2003218554/-1/-1/0/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF
10author: Nasreddine Bencherchali (Nextron Systems)
11date: 2023-05-11
12tags:
13 - attack.execution
14logsource:
15 category: file_event
16 product: windows
17detection:
18 selection:
19 TargetFilename|startswith: 'C:\Windows\WinSxS\'
20 TargetFilename|endswith: '.exe'
21 filter_main_system_location:
22 Image|startswith:
23 - 'C:\Windows\Systems32\'
24 - 'C:\Windows\SysWOW64\'
25 - 'C:\Windows\WinSxS\'
26 condition: selection and not 1 of filter_main_*
27falsepositives:
28 - Unknown
29level: medium
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- AMSI Bypass Pattern Assembly GetType
- APT29 2018 Phishing Campaign CommandLine Indicators
- AWS EC2 Startup Shell Script Change