heroui logo

Renamed AutoHotkey.EXE Execution

Sigma Rules

View Source
Summary
This rule aims to detect the execution of renamed instances of the AutoHotkey executable (AutoHotkey.exe) by analyzing key properties in the Portable Executable (PE) metadata. AutoHotkey is a popular scripting language mainly used for automation on Windows systems. Attackers may rename this executable to evade detection while using it for malicious purposes. The detection logic comprises specific selection criteria that include checking if the Product or Description fields contain 'AutoHotkey' or if any of the OriginalFileNames match known variants of AutoHotkey. Additionally, a filtering mechanism is in place to ensure that only the genuinely renamed executables trigger alerts, enhancing the accuracy of detection and limiting false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-02-07