
Summary
The rule 'Renamed MegaSync Execution' is designed to detect instances where the executable for MegaSync (megasync.exe) is executed after being renamed. This behavior is indicative of potential malicious activity, specifically associated with ransomware families such as Nefilim, Sodinokibi, Pysa, and Conti that utilize renamed versions of legitimate applications to obfuscate their activities. The detection logic involves checking for process creation events that have the original filename set as 'megasync.exe', while simultaneously ensuring the image path ends with 'megasync.exe', meaning it checks if the file has explicitly been renamed. The level of threat associated with this detection is considered high due to the nature of its ties with known ransomware operations. False positives may arise from legitimate software that has renamed MegaSync or from administrators deliberately renaming the application for valid reasons, which must be taken into account when evaluating alerts generated by this rule.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-06-22