
Summary
The 'Detect Renamed 7-Zip' rule analyzes Sysmon data to detect when the legitimate 7-Zip executable has been renamed, indicating potential malicious activity. Attackers often rename trusted tools to bypass security measures while engaging in data staging or exfiltration, making this detection critical for preventing data breaches. The rule captures instances where the original file name matches '7z*.exe' but the process name diverges, suggesting that the application has been repurposed for unauthorized use. The search leverages multiple data sources including Sysmon EventID 1 and Windows Event Log Security 4688, ensuring a comprehensive analysis over the endpoint data model. Analysts are encouraged to validate the results against common legitimate use cases and investigate other processes running in parallel to gather a holistic view of the activity.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
- Logon Session
- File
ATT&CK Techniques
- T1560.001
- T1560
Created: 2024-11-13