heroui logo

Executable File Creation with Multiple Extensions

Elastic Detection Rules

View Source
Summary
This detection rule identifies the creation of executable files that are masquerading under multiple extensions, a tactic often used by adversaries to evade defenses by disguising malicious files as benign documents or media. The rule leverages EQL (Event Query Language) to monitor Windows file creations and employs regex to match specific file patterns, emphasizing those that append executable extensions to common file types like .pdf, .jpg, etc. It also filters out legitimate processes to minimize false positives, focusing on suspicious activities that could indicate an attempt at defense evasion. The guidance provided outlines investigation steps and potential remediation actions, aimed at assisting analysts in assessing and responding to detected threats effectively.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Process
  • Windows Registry
  • Network Traffic
  • Logon Session
ATT&CK Techniques
  • T1036
  • T1036.007
  • T1204
  • T1204.002
Created: 2021-01-19