heroui logo

Masquerading Space After Filename

Elastic Detection Rules

View Source
Summary
This EQL detection rule identifies processes created from executables that have a space appended to their filenames, a technique that may be used to disguise malicious files as benign applications, thereby tricking users into executing them. In operating systems like Linux and macOS, executable files can run based on their true filetype instead of their file extension. This can lead to a situation where a file appears harmless but executes malicious code when launched due to a space being appended. The rule focuses on monitoring process creation events, specifically filtering for processes that match the criteria of having a space at the end of their filename while excluding known safe processes to minimize false positives. This detection is crucial for recognizing attempts of defense evasion where adversaries apply such tactics to bypass security mechanisms.
Categories
  • Endpoint
Data Sources
  • Process
  • File
  • Command
ATT&CK Techniques
  • T1036
  • T1036.006
Created: 2022-10-18