Execution Of Non-Existing File
Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)
Sigma rule (View on GitHub)
1title: Execution Of Non-Existing File
2id: 71158e3f-df67-472b-930e-7d287acaa3e1
3status: test
4description: Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)
5references:
6 - https://pentestlaboratories.com/2021/12/08/process-ghosting/
7author: Max Altgelt (Nextron Systems)
8date: 2021-12-09
9modified: 2022-12-14
10tags:
11 - attack.defense-evasion
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 image_absolute_path:
17 Image|contains: '\'
18 filter_null:
19 Image: null
20 filter_empty:
21 Image:
22 - '-'
23 - ''
24 filter_4688:
25 - Image:
26 - 'System'
27 - 'Registry'
28 - 'MemCompression'
29 - 'vmmem'
30 - CommandLine:
31 - 'Registry'
32 - 'MemCompression'
33 - 'vmmem'
34 condition: not image_absolute_path and not 1 of filter*
35falsepositives:
36 - Unknown
37level: high
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity