heroui logo

Renamed Microsoft Teams Execution

Sigma Rules

View Source
Summary
This rule detects suspicious activities related to the execution of renamed binaries associated with Microsoft Teams on Windows systems. The focus is on identifying potential evasion tactics employed by malicious actors who rename legitimate executable files to mask their true intent. Specifically, the rule looks for instances where either 'msteams.exe' or 'teams.exe' is being executed but under a different name, indicating a possible attempt to bypass security measures. It utilizes process creation logs to filter based on the original file names and compares them with known legitimate binaries to ensure that only those instances where the executable name is not as expected generate alerts. This is an important detection as it helps in the early identification of potentially compromised systems where adversaries may be using well-known applications to conduct malicious activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2024-07-12