
Summary
The detection rule targets the use of Windows 8.3 short names, which can be leveraged by malicious actors to evade detection mechanisms that rely on more conventional file naming formats. The rule specifies that it logs occurrences where process creation involves standard Windows short name formats, notably those beginning with '~'. It executes a selection condition where the image name contains specific short name patterns; and it additionally includes filtering to exclude processes that originate from specific parent images such as 'explorer.exe', 'WebexHost.exe', 'thor64.exe', 'WinZip.exe', and 'VCREDI~1.EXE'. This helps to reduce false positives from common software installations that may use short filenames without malicious intent. The underlying concern is that these short names may allow compromised applications or scripts to run unnoticed, thus serving as an attack vector in evasion strategies.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Process
Created: 2022-08-06