
Summary
The detection rule "Rename System Utilities" is designed to identify potential instances where adversaries may rename legitimate system utilities as a method of evading security measures. This behavior is notably associated with various threat actors including APT29 (Nobelium/Cozy Bear), FIN6, and Lockean, among others, who have been known to utilize similar tactics during their operations to bypass detection by security tools. The rule leverages data from Windows event logs, specifically looking for Event ID 4663, which monitors when an object (in this case, a utility) is created or modified. By using Splunk logic, the rule captures events where legitimate system utilities might be renamed, effectively allowing defenders to track this potential masquerading activity. The captured data includes details about the event time, host, user, process involved, and the renamed object, making it a comprehensive tool for security analysts to investigate possible malicious behavior.
Categories
- Windows
Data Sources
- Windows Registry
- Application Log
ATT&CK Techniques
- T1036.003
Created: 2024-02-09