heroui logo

Renamed AutoIt Scripts Interpreter

Elastic Detection Rules

View Source
Summary
The rule identifies potentially malicious activities related to renamed AutoIt scripts on Windows systems, which can be indicative of attempts by threat actors to evade detection. AutoIt is commonly used by attackers to create automation scripts, often with malicious intent. The detection focuses on processes executing with a PE (Portable Executable) file's original name matching 'AutoIt*.exe' while the process name does not directly correspond to the executable name, hinting at renaming to bypass security tools. The rule employs Elastic Query Language (EQL) to analyze process events and leverages various index sources such as Winlogbeat and Sysmon logs. This rule addresses defense evasion tactics associated with the MITRE ATT&CK framework, particularly the masquerading technique, which includes renaming system utilities to disguise their true purpose. Effective investigation of this alert should involve examining process execution chains, conducting behavioral analysis of suspect processes, and reviewing network connections made by the involved executables.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Logon Session
  • Network Traffic
ATT&CK Techniques
  • T1036
  • T1036.003
Created: 2020-09-01