
Summary
This detection rule identifies the execution of SysInternals DebugView that has been renamed, which may indicate malicious intent. A common tactic used by adversaries is to rename legitimate tools to evade detection systems. This rule operates by monitoring process creation events on Windows systems. The detection specifically checks for processes with the name 'Syinternals DebugView' while ensuring that the original filename remains 'Dbgview.exe' and that the image path ends with 'Dbgview.exe'. If these conditions are met, but the image is different from the expected, the rule triggers an alert. The level of importance assigned to this detection is 'high' due to potential misuse of debugging tools for information gathering and reconnaissance by attackers.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-05-28