heroui logo

Renamed Process

Anvilogic Forge

View Source
Summary
The Renamed Process detection rule identifies potential masquerading attempts by adversaries who rename processes to appear legitimate, thus evading detection mechanisms. This manipulation can involve changing the file's name or its location, as well as altering other characteristics to mislead both users and security systems. Given the reliance on features unique to SysMon, this rule mandates the use of SysMon version 10.0 or later. It works by comparing the original file name of a process with its executed name, helping to flag discrepancies. Notably, the logic utilizes a series of regex transformations to normalize the file names before comparison. Although the detection is aimed at identifying malicious activity, it is essential to whitelist regular operations that may involve renaming legitimate processes to minimize false positives. The rule ties into specific threats associated with the SideWinder group and is part of a broader set of detection techniques under the defense evasion category. The logic is written for use with the Splunk platform, leveraging various commands to extract endpoint data and apply statistical analysis for anomalies. It references notable sources for further reading on related atomic tests and SysMon features.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • File
  • Image
ATT&CK Techniques
  • T1036.003
  • T1036
Created: 2024-02-09