
Summary
The detection rule titled 'Detect Renamed WinRAR' identifies instances where the executable 'WinRAR.exe' has been renamed and executed on endpoints. This analysis is critical as attackers frequently rename executable files to evade detection systems. The rule leverages data from Endpoint Detection and Response (EDR) solutions, specifically focusing on process names and the original file names associated with the activity. By querying the Endpoint data model, it captures cases where the original file name is identified as 'WinRAR.exe' but the executed process name has been altered (i.e., not 'rar.exe' or 'winrar.exe'). The detection method entails the correlation of EventID 1 from Sysmon, Windows Event Log Security 4688 logs, and CrowdStrike ProcessRollup2 data to surface potential threats, suggesting the possibility of unauthorized actions such as data exfiltration or additional system compromises. Such behavior is indicative of evasion tactics commonly used in malicious activities, necessitating focused security monitoring and response capabilities.
Categories
- Endpoint
Data Sources
- Pod
- Process
- Windows Registry
- User Account
- Application Log
ATT&CK Techniques
- T1560.001
- T1560
Created: 2025-01-27