Suspicious Double Extension File Execution
Detects suspicious use of an .exe extension after a non-executable file extension like .pdf.exe, a set of spaces or underlines to cloak the executable file in spear phishing campaigns
Sigma rule (View on GitHub)
1title: Suspicious Double Extension File Execution
2id: 1cdd9a09-06c9-4769-99ff-626e2b3991b8
3related:
4 - id: 5e6a80c8-2d45-4633-9ef4-fa2671a39c5c # ParentImage/ParentCommandLine
5 type: similar
6status: stable
7description: Detects suspicious use of an .exe extension after a non-executable file extension like .pdf.exe, a set of spaces or underlines to cloak the executable file in spear phishing campaigns
8references:
9 - https://blu3-team.blogspot.com/2019/06/misleading-extensions-xlsexe-docexe.html
10 - https://twitter.com/blackorbird/status/1140519090961825792
11 - https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
12author: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems)
13date: 2019-06-26
14modified: 2025-05-30
15tags:
16 - attack.initial-access
17 - attack.t1566.001
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection:
23 Image|endswith:
24 - ' .exe'
25 - '______.exe'
26 - '.doc.exe'
27 - '.doc.js'
28 - '.docx.exe'
29 - '.docx.js'
30 - '.gif.exe'
31 - '.jpeg.exe'
32 - '.jpg.exe'
33 - '.mkv.exe'
34 - '.mov.exe'
35 - '.mp3.exe'
36 - '.mp4.exe'
37 - '.pdf.exe'
38 - '.pdf.js'
39 - '.png.exe'
40 - '.ppt.exe'
41 - '.ppt.js'
42 - '.pptx.exe'
43 - '.pptx.js'
44 - '.rtf.exe'
45 - '.rtf.js'
46 - '.svg.exe'
47 - '.txt.exe'
48 - '.txt.js'
49 - '.xls.exe'
50 - '.xls.js'
51 - '.xlsx.exe'
52 - '.xlsx.js'
53 - '⠀⠀⠀⠀⠀⠀.exe' # Unicode Space Character: Braille Pattern Blank (Unicode: U+2800)
54 CommandLine|contains:
55 - ' .exe'
56 - '______.exe'
57 - '.doc.exe'
58 - '.doc.js'
59 - '.docx.exe'
60 - '.docx.js'
61 - '.gif.exe'
62 - '.jpeg.exe'
63 - '.jpg.exe'
64 - '.mkv.exe'
65 - '.mov.exe'
66 - '.mp3.exe'
67 - '.mp4.exe'
68 - '.pdf.exe'
69 - '.pdf.js'
70 - '.png.exe'
71 - '.ppt.exe'
72 - '.ppt.js'
73 - '.pptx.exe'
74 - '.pptx.js'
75 - '.rtf.exe'
76 - '.rtf.js'
77 - '.svg.exe'
78 - '.txt.exe'
79 - '.txt.js'
80 - '.xls.exe'
81 - '.xls.js'
82 - '.xlsx.exe'
83 - '.xlsx.js'
84 - '⠀⠀⠀⠀⠀⠀.exe' # Unicode Space Character: Braille Pattern Blank (Unicode: U+2800)
85 condition: selection
86falsepositives:
87 - Unknown
88level: high
References
Related rules
- Disk Image Mounting Via Hdiutil - MacOS
- Arbitrary Shell Command Execution Via Settingcontent-Ms
- Droppers Exploiting CVE-2017-11882
- Exploit for CVE-2017-0261
- Exploit for CVE-2017-8759