
Summary
The Renamed FTP.EXE Execution detection rule focuses on identifying the execution of a modified file named 'ftp.exe' by inspecting the Portable Executable (PE) metadata fields. The purpose of this detection is to help uncover cases where attackers may rename legitimate binaries, such as 'ftp.exe', to bypass security measures and execute malicious commands. The rule analyzes process creation events from Windows logs, targeting instances where the 'OriginalFileName' field of a process is identified as 'ftp.exe', but the actual file being executed does not conform to this naming pattern (i.e., it is a renamed version). By filtering such renamed processes, the rule increases visibility into potential exploitation attempts and unauthorized access to systems using FTP via disguised binary executions.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-10-09