
Summary
This detection rule aims to identify potential malicious binaries that are named after legitimate Sysinternals tools. Cybercriminals often use this tactic to bypass security measures, as these tools are commonly trusted in Windows environments. The rule specifically looks for processes that have file names matching those of popular Sysinternals utilities such as 'Procmon.exe', 'PsExec.exe', and 'Autoruns.exe'. It employs a condition that checks for executables whose names match the Sysinternals naming convention and validates their company names to ensure they are not from the legitimate Sysinternals publisher. If the company filter returns no valid results, the detection is triggered, indicating a possible impersonation or evasion attempt. This rule is particularly relevant in environments where Sysinternals tools are frequently used, therefore monitoring their usage can help in early detection of malicious exercises in the system.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-12-20