heroui logo

Renamed Gpg.EXE Execution

Sigma Rules

View Source
Summary
This detection rule aims to identify the execution of a renamed 'gpg.exe', a tool that is typically used for encryption and decryption of data. Ransomware and various loaders often utilize such tools to manipulate data stealthily. The rule monitors process creation events on Windows systems and looks for any process where the original filename is 'gpg.exe'. Additionally, it applies a filter to include only those processes whose image paths end with either '\gpg.exe' or '\gpg2.exe', ensuring that legitimate instances of 'gpg.exe' are not incorrectly flagged. This rule is crucial in detecting malicious activities, particularly those associated with ransomware threats that use renamed binaries to obfuscate their presence.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Process
Created: 2023-08-09