Renamed Whoami Execution
Detects the execution of whoami that has been renamed to a different name to avoid detection
Sigma rule (View on GitHub)
1title: Renamed Whoami Execution
2id: f1086bf7-a0c4-4a37-9102-01e573caf4a0
3status: test
4description: Detects the execution of whoami that has been renamed to a different name to avoid detection
5references:
6 - https://brica.de/alerts/alert/public/1247926/agent-tesla-keylogger-delivered-inside-a-power-iso-daa-archive/
7 - https://app.any.run/tasks/7eaba74e-c1ea-400f-9c17-5e30eee89906/
8author: Florian Roth (Nextron Systems)
9date: 2021-08-12
10modified: 2022-10-09
11tags:
12 - attack.discovery
13 - attack.t1033
14 - car.2016-03-001
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection:
20 OriginalFileName: 'whoami.exe'
21 filter:
22 Image|endswith: '\whoami.exe'
23 condition: selection and not filter
24falsepositives:
25 - Unknown
26level: critical
References
Related rules
- Enumerate All Information With Whoami.EXE
- HackTool - SharpLdapWhoami Execution
- WhoAmI as Parameter
- Whoami Utility Execution
- Cisco Discovery