Renamed Autohotkey Binary
Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
Sigma rule (View on GitHub)
1title: Renamed Autohotkey Binary
2id: 141c8cd8-ef88-45c4-8891-ea41a72d3d17
3status: experimental
4description: Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
5references:
6 - https://attack.mitre.org/techniques/T1036/
7 - https://thedfirreport.com/2023/02/06/collect-exfiltrate-sleep-repeat/
8author: TheDFIRReport
9date: 2023/02/05
10
11tags:
12 - attack.defense_evasion
13 - attack.t1036.003
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_v1:
19 OriginalFileName:
20 - 'AutoHotkey.exe'
21 selection_v2:
22 Product|contains:
23 - 'AutoHotkey'
24 filter:
25 Image|endswith:
26 - '\AutoHotkey.exe'
27 - '\AutoHotkeyA32.exe'
28 - '\AutoHotkeyU32.exe'
29 - '\AutoHotkeyU64.exe'
30 - '\AutoHotkey32.exe'
31 - '\AutoHotkey64.exe'
32 - '\AutoHotkey32_UIA.exe'
33 - '\AutoHotkey64_UIA.exe'
34 condition: 1 of selection_* and not filter
35falsepositives:
36 - Unknown
37level: medium
References
Related rules
- Suspicious Use of Rcedit Utility to Alter Executable Metadata
- Command or Scripting Interpreter Creating EXE File
- File Creation of Executables in Temp Folders (Event 4663)
- Process Creation without .exe File Extension
- Process Executing with Unusual Command Lines