heroui logo

Process Launched Without Image Name

Sigma Rules

View Source
Summary
This detection rule targets the creation of processes in Windows systems that do not have an associated image name ending with '.exe'. Such behaviors are indicative of attempts to evade traditional image-based monitoring solutions, making this an important rule for threat hunting and defense. The rule's logic captures any invocation of processes that do not follow typical executable naming conventions, which can often highlight suspicious or malicious activities, particularly in environments where malware attempts to disguise itself by avoiding detection mechanisms focusing on known executable files. It is designed to assist security teams in identifying processes that might otherwise go unnoticed by standard detection methods.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2024-07-23