System File Execution Location Anomaly

Detects a Windows program executable started from a suspicious folder

Sigma rule (View on GitHub)

 1title: System File Execution Location Anomaly
 2id: e4a6b256-3e47-40fc-89d2-7a477edd6915
 3status: experimental
 4description: Detects a Windows program executable started from a suspicious folder
 5references:
 6    - https://twitter.com/GelosSnake/status/934900723426439170
 7    - https://asec.ahnlab.com/en/39828/
 8author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali
 9date: 2017/11/27
10modified: 2023/10/18
11tags:
12    - attack.defense_evasion
13    - attack.t1036
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        Image|endswith:
20            - '\svchost.exe'
21            - '\rundll32.exe'
22            - '\services.exe'
23            - '\powershell.exe'
24            - '\powershell_ise.exe'
25            - '\pwsh.exe'
26            - '\regsvr32.exe'
27            - '\spoolsv.exe'
28            - '\lsass.exe'
29            - '\smss.exe'
30            - '\csrss.exe'
31            - '\conhost.exe'
32            - '\wininit.exe'
33            - '\lsm.exe'
34            - '\winlogon.exe'
35            - '\explorer.exe'
36            - '\taskhost.exe'
37            - '\Taskmgr.exe'
38            - '\sihost.exe'
39            - '\RuntimeBroker.exe'
40            - '\smartscreen.exe'
41            - '\dllhost.exe'
42            - '\audiodg.exe'
43            - '\wlanext.exe'
44            - '\dashost.exe'
45            - '\schtasks.exe'
46            - '\cscript.exe'
47            - '\wscript.exe'
48            - '\wsl.exe'
49            - '\bitsadmin.exe'
50            - '\atbroker.exe'
51            - '\bcdedit.exe'
52            - '\certutil.exe'
53            - '\certreq.exe'
54            - '\cmstp.exe'
55            - '\consent.exe'
56            - '\defrag.exe'
57            - '\dism.exe'
58            - '\dllhst3g.exe'
59            - '\eventvwr.exe'
60            - '\msiexec.exe'
61            - '\runonce.exe'
62            - '\winver.exe'
63            - '\logonui.exe'
64            - '\userinit.exe'
65            - '\dwm.exe'
66            - '\LsaIso.exe'
67            - '\ntoskrnl.exe'
68            # The below processes were seen used by Lazarus Group - https://asec.ahnlab.com/en/39828/
69            - '\wsmprovhost.exe'
70            - '\dfrgui.exe'
71    filter_generic:
72        - Image|startswith:
73              - 'C:\Windows\System32\'
74              - 'C:\Windows\SysWOW64\'
75              - 'C:\Windows\WinSxS\'
76              # - 'C:\avast! sandbox'
77        - Image|contains: '\SystemRoot\System32\'
78        - Image:
79              - 'C:\Windows\explorer.exe'
80              - 'C:\Program Files\PowerShell\7\pwsh.exe'
81              - 'C:\Program Files\PowerShell\7-preview\pwsh.exe'
82    filter_wsl_windowsapps:
83        Image|startswith: 'C:\Program Files\WindowsApps\MicrosoftCorporationII.WindowsSubsystemForLinux'
84        Image|endswith: '\wsl.exe'
85    condition: selection and not 1 of filter_*
86fields:
87    - ComputerName
88    - User
89    - Image
90falsepositives:
91    - Exotic software
92level: high

References

Related rules

to-top