
Summary
This detection rule identifies the execution of the `Ilasm.EXE` application, a tool used to compile C# Intermediate Language (IL) code into executable files (EXE) or dynamic link libraries (DLL). The rule monitors process creation events in a Windows environment specifically targeting `ilasm.exe` calls. The defined criteria include checking if the executed image ends with `\ilasm.exe` or has `OriginalFileName` set to `ilasm.exe`, along with a command-line argument containing either `/dll` or `/exe` to indicate a compilation action. This behavior may be indicative of code compilation attempts which could be utilized for evasion tactics in malware development. As such, detecting the use of this binary helps in identifying potentially malicious activities that leverage this tool for executing compiled code on compromised systems. Users should be cautious as the behavior can also result from legitimate development processes, which may lead to false positives.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Process
Created: 2022-05-07