
Summary
The 'Suspicious MSBuild Rename' rule is designed to detect suspicious activities related to the execution of instances of 'msbuild.exe' that have been renamed. It primarily utilizes data sourced from Endpoint Detection and Response (EDR) agents, focusing on analyzing process names and original file names documented in the Endpoint data model. Attackers frequently exploit legitimate tools like MSBuild to execute malicious payloads while circumventing typical security measures. The detection logic entails filtering out instances where the process name deviates from the standard 'msbuild.exe' while the original file name remains 'MSBuild.exe'. If such renamed executables are confirmed as malicious, they can potentially lead to malicious code execution, data breaches, or unauthorized lateral movement within an organizational network. By systematically identifying these occurrences, the rule enhances visibility into potential threats stemming from normal user interfaces being manipulated by malicious actors that capitalize on trusted utilities to mask their activities.
Categories
- Endpoint
Data Sources
- Pod
- Process
- Windows Registry
- Image
ATT&CK Techniques
- T1127.001
- T1036
- T1127
- T1036.003
Created: 2024-11-13