Detection rules › Sigma
Files With System Process Name In Unsuspected Locations
Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.). It is highly recommended to perform an initial baseline before using this rule in production.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1036.005 Masquerading: Match Legitimate Resource Name or Location |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 11 | FileCreate |
Stages and Predicates
Stage 1: selection
or:
TargetFilename|endswith: '\AtBroker.exe'
TargetFilename|endswith: '\LogonUI.exe'
TargetFilename|endswith: '\LsaIso.exe'
TargetFilename|endswith: '\RuntimeBroker.exe'
TargetFilename|endswith: '\SearchFilterHost.exe'
TargetFilename|endswith: '\SearchIndexer.exe'
TargetFilename|endswith: '\SearchProtocolHost.exe'
TargetFilename|endswith: '\SecurityHealthService.exe'
TargetFilename|endswith: '\SecurityHealthSystray.exe'
TargetFilename|endswith: '\ShellAppRuntime.exe'
TargetFilename|endswith: '\SystemSettingsBroker.exe'
TargetFilename|endswith: '\Taskmgr.exe'
TargetFilename|endswith: '\TiWorker.exe'
TargetFilename|endswith: '\WSReset.exe'
TargetFilename|endswith: '\WUDFHost.exe'
TargetFilename|endswith: '\WWAHost.exe'
TargetFilename|endswith: '\WerFault.exe'
TargetFilename|endswith: '\WerFaultSecure.exe'
TargetFilename|endswith: '\WinRTNetMUAHostServer.exe'
TargetFilename|endswith: '\WmiPrvSE.exe'
TargetFilename|endswith: '\audiodg.exe'
TargetFilename|endswith: '\backgroundTaskHost.exe'
TargetFilename|endswith: '\bcdedit.exe'
TargetFilename|endswith: '\bitsadmin.exe'
TargetFilename|endswith: '\cmdl32.exe'
TargetFilename|endswith: '\cmstp.exe'
TargetFilename|endswith: '\conhost.exe'
TargetFilename|endswith: '\csrss.exe'
TargetFilename|endswith: '\dasHost.exe'
TargetFilename|endswith: '\dfrgui.exe'
TargetFilename|endswith: '\dllhost.exe'
TargetFilename|endswith: '\dwm.exe'
TargetFilename|endswith: '\eventcreate.exe'
TargetFilename|endswith: '\eventvwr.exe'
TargetFilename|endswith: '\explorer.exe'
TargetFilename|endswith: '\extrac32.exe'
TargetFilename|endswith: '\fontdrvhost.exe'
TargetFilename|endswith: '\fsquirt.exe'
TargetFilename|endswith: '\ipconfig.exe'
TargetFilename|endswith: '\iscsicli.exe'
TargetFilename|endswith: '\iscsicpl.exe'
TargetFilename|endswith: '\logman.exe'
TargetFilename|endswith: '\lsass.exe'
TargetFilename|endswith: '\lsm.exe'
TargetFilename|endswith: '\msiexec.exe'
TargetFilename|endswith: '\msinfo32.exe'
TargetFilename|endswith: '\mstsc.exe'
TargetFilename|endswith: '\nbtstat.exe'
TargetFilename|endswith: '\odbcconf.exe'
TargetFilename|endswith: '\powershell.exe'
TargetFilename|endswith: '\pwsh.exe'
TargetFilename|endswith: '\regini.exe'
TargetFilename|endswith: '\regsvr32.exe'
TargetFilename|endswith: '\rundll32.exe'
TargetFilename|endswith: '\schtasks.exe'
TargetFilename|endswith: '\services.exe'
TargetFilename|endswith: '\sihost.exe'
TargetFilename|endswith: '\smartscreen.exe'
TargetFilename|endswith: '\smss.exe'
TargetFilename|endswith: '\spoolsv.exe'
TargetFilename|endswith: '\svchost.exe'
TargetFilename|endswith: '\taskhost.exe'
TargetFilename|endswith: '\taskhostw.exe'
TargetFilename|endswith: '\vssadmin.exe'
TargetFilename|endswith: '\w32tm.exe'
TargetFilename|endswith: '\wermgr.exe'
TargetFilename|endswith: '\wevtutil.exe'
TargetFilename|endswith: '\wininit.exe'
TargetFilename|endswith: '\winlogon.exe'
TargetFilename|endswith: '\winrshost.exe'
TargetFilename|endswith: '\wlanext.exe'
TargetFilename|endswith: '\wlrmdr.exe'
TargetFilename|endswith: '\wslhost.exe'
Stage 2: not 1 of filter_main_*
or:
or:
Image|endswith: 'C:\WINDOWS\SysWOW64\msiexec.exe'
Image|endswith: 'C:\WINDOWS\system32\msiexec.exe'
or:
TargetFilename|startswith: 'C:\Program Files\PowerShell\7-preview\pwsh.exe'
TargetFilename|startswith: 'C:\Program Files\PowerShell\7\pwsh.exe'
TargetFilename|startswith: 'C:\Program Files\WindowsApps\Microsoft.PowerShellPreview\'
or:
Image|endswith: 'C:\Windows\SysWOW64\svchost.exe'
Image|endswith: 'C:\Windows\system32\svchost.exe'
or:
TargetFilename|contains: 'C:\Program Files (x86)\WindowsApps\'
TargetFilename|contains: 'C:\Program Files\WindowsApps\'
TargetFilename|contains: '\AppData\Local\Microsoft\WindowsApps\'
or:
Image|endswith: '\TiWorker.exe'
Image|endswith: '\wuaucltcore.exe'
TargetFilename|startswith: 'C:\Windows\Temp\'
Image|endswith: '\SecurityHealthSetup.exe'
TargetFilename|endswith: '\SecurityHealthSystray.exe'
TargetFilename|contains: 'C:\Windows\System32\SecurityHealth\'
Image: 'C:\Windows\SysWOW64\wuauclt.exe'
Image: 'C:\Windows\System32\wuauclt.exe'
Image: 'C:\Windows\UUS\arm64\wuaucltcore.exe'
TargetFilename|endswith: 'C:\Windows\explorer.exe'
TargetFilename|contains: 'C:\$WINDOWS.~BT\'
TargetFilename|contains: 'C:\$WinREAgent\'
TargetFilename|contains: 'C:\Windows\SoftwareDistribution\'
TargetFilename|contains: 'C:\Windows\SysWOW64\'
TargetFilename|contains: 'C:\Windows\System32\'
TargetFilename|contains: 'C:\Windows\WinSxS\'
TargetFilename|contains: 'C:\Windows\uus\'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Image | ends_with |
|
Image | eq |
|
TargetFilename | ends_with |
|
TargetFilename | match |
|
TargetFilename | starts_with |
|