heroui logo

Renamed Jusched.EXE Execution

Sigma Rules

View Source
Summary
This detection rule is designed to identify the execution of a renamed instance of 'jusched.exe', which is associated with the Java Update Scheduler. The rule specifically targets the behavior exhibited by the Cobalt group, known for leveraging legitimate tools for malicious purposes. The detection logic focuses on process creation logs where the description of the process matches common names for the Java Update Scheduler while filtering for names that end with 'jusched.exe'. The rule is structured to alert on instances where the suspected executable is executed but is not recognized as the legitimate Java Update Scheduler, thereby identifying a potential evasion tactic typically used by attackers.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2019-06-04