Detection rules › Sigma

Hacktool Execution - PE Metadata

Severity
high
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects the execution of different Windows based hacktools via PE metadata (company, product, etc.) even if the files have been renamed

MITRE ATT&CK coverage

TacticTechniques
Resource DevelopmentT1588.002 Obtain Capabilities: Tool
Credential AccessT1003 OS Credential Dumping

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: selection

Company: Cube0x0

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Companyeq
  • Cube0x0