heroui logo

Suspicious Csi.exe Usage

Sigma Rules

View Source
Summary
This detection rule monitors the execution of the Csi.exe and Rcsi.exe binaries, which are legitimate Microsoft tools included with Visual Studio for running C# interactive sessions. While these binaries can be used for legitimate development purposes, their presence could also indicate malicious activities, particularly if they are used to execute unintended or harmful code. The detection logic identifies processes that create instances of these executables, leveraging signature matching for file paths and original file names, in conjunction with the company name for further validation of legitimacy. The rule is particularly sensitive to command line inputs passed to these executables, making it useful for detecting abuse scenarios where attackers may use these tools for evasion or execution-based tactics. Additionally, alerts generated may need careful evaluation, as legitimate developers may invoke these tools in normal development workflows.
Categories
  • Endpoint
  • Windows
  • Application
Data Sources
  • Process
Created: 2020-10-17