heroui logo

HackTool Named File Stream Created

Sigma Rules

View Source
Summary
This detection rule identifies the creation of named file streams that are associated with specific known hack tools, based on their import hashes. It utilizes Sysmon logs to monitor events related to the 'create_stream_hash' action on Windows systems, which indicates when a file stream is created with an import hash matching that of commonly used hacking tools. The rule is critical for environments that need to defend against unauthorized use of such tools, as attackers often employ these methods to evade detection and maintain persistence. Given the sophistication of modern attacks, detecting the creation of these file streams serves as an important early warning sign of potential malicious activity.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • File
  • Process
  • Logon Session
Created: 2022-08-24