Renamed Microsoft Teams Execution

Detects the execution of a renamed Microsoft Teams binary.

Sigma rule (View on GitHub)

 1title: Renamed Microsoft Teams Execution
 2id: 88f46b67-14d4-4f45-ac2c-d66984f22191
 3status: experimental
 4description: Detects the execution of a renamed Microsoft Teams binary.
 5references:
 6    - Internal Research
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2024-07-12
 9tags:
10    - attack.defense-evasion
11logsource:
12    category: process_creation
13    product: windows
14detection:
15    selection:
16        OriginalFileName:
17            - 'msteams.exe'
18            - 'teams.exe'
19    filter_main_legit_names:
20        Image|endswith:
21            - '\msteams.exe'
22            - '\teams.exe'
23    condition: selection and not 1 of filter_main_*
24falsepositives:
25    - Unknown
26level: medium

References

Related rules

to-top