Sysmon File Executable Creation Detected
Triggers on any Sysmon "FileExecutableDetected" event, which triggers every time a PE that is monitored by the config is created.
Sigma rule (View on GitHub)
1title: Sysmon File Executable Creation Detected
2id: 693a44e9-7f26-4cb6-b787-214867672d3a
3status: test
4description: Triggers on any Sysmon "FileExecutableDetected" event, which triggers every time a PE that is monitored by the config is created.
5references:
6 - https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
7 - https://medium.com/@olafhartong/sysmon-15-0-file-executable-detected-40fd64349f36
8author: frack113
9date: 2023-07-20
10tags:
11 - attack.defense-evasion
12logsource:
13 product: windows
14 service: sysmon
15detection:
16 selection:
17 EventID: 29 # this is fine, we want to match any FileExecutableDetected event
18 condition: selection
19falsepositives:
20 - Unlikely
21level: medium
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity