heroui logo

1 or 2 Character Executable

Anvilogic Forge

View Source
Summary
This detection rule is focused on identifying potentially malicious executable files that are named with only 1 or 2 characters before the '.exe' extension. Such naming conventions are often employed by threat actors to evade detection and complicate analysis, as these shortened names can easily blend in with legitimate processes. The rule is designed to analyze Windows Event Logs, specifically looking at process creation events (Event Code 4688). It utilizes Splunk commands to filter out known benign processes (like 'sc.exe') and lists processes with names matching the regex pattern for executable files with 1 or 2 characters. Moreover, the rule includes relevant threat actor associations – such as Lotus Blossom, OilRig, Trigona, and Volt Typhoon – known for similar tactics. The detection accommodates for event data from endpoint sensors and aggregates results based on host and timestamp, providing actionable insights into potential executions of these suspect files.
Categories
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1059
  • T1036
Created: 2024-02-09