heroui logo

Potential Masquerading as Communication Apps

Elastic Detection Rules

View Source
Summary
This rule detects potential masquerading of legitimate communication applications on Windows systems, signaling an attempt to bypass security mechanisms or execute malware. The rule specifically flags processes that are crucial in everyday communication—like Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook, and Thunderbird—when their code signatures do not match the expected trusted publishers. It uses EQL (Event Query Language) to pinpoint processes that are started with non-compliant signatures from specified trusted entities, indicating potential malicious activity. The importance of this detection lies in thwarting advanced evasion techniques by adversaries who might rename or modify communication software to disguise malware. The rule encourages a thorough investigation of flagged processes, examining their origins, parent processes, network connections, and system logs. It also stresses the need for triage steps and possible mitigations in case of false positives, ensuring that legitimate software is not misidentified while maintaining vigilance against potential threats.
Categories
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1036
  • T1036.001
  • T1036.005
  • T1554
Created: 2023-05-05