Renamed Autohotkey Binary

Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.

Sigma rule (View on GitHub)

 1title: Renamed Autohotkey Binary
 2id: 141c8cd8-ef88-45c4-8891-ea41a72d3d17
 3status: experimental
 4description: Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
 5references:
 6    - https://attack.mitre.org/techniques/T1036/
 7    - https://thedfirreport.com/2023/02/06/collect-exfiltrate-sleep-repeat/
 8author: TheDFIRReport
 9date: 2023/02/05
10
11tags:
12    - attack.defense_evasion
13    - attack.t1036.003
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection_v1:
19        OriginalFileName:
20            - 'AutoHotkey.exe'
21    selection_v2:
22        Product|contains:
23           - 'AutoHotkey' 
24    filter:
25        Image|endswith:
26            - '\AutoHotkey.exe'
27            - '\AutoHotkeyA32.exe'
28            - '\AutoHotkeyU32.exe'
29            - '\AutoHotkeyU64.exe'
30            - '\AutoHotkey32.exe'
31            - '\AutoHotkey64.exe'
32            - '\AutoHotkey32_UIA.exe'
33            - '\AutoHotkey64_UIA.exe'
34    condition: 1 of selection_* and not filter
35falsepositives:
36    - Unknown
37level: medium

References

Related rules

to-top