Detection rules › Sigma
PUA - Potential PE Metadata Tamper Using Rcedit
Detects the use of rcedit to potentially alter executable PE metadata properties, which could conceal efforts to rename system utilities for defense evasion.
MITRE ATT&CK coverage
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: all of selection_img
or:
Description: 'Edit resources of exe'
Image|endswith: '\rcedit-x64.exe'
Image|endswith: '\rcedit-x86.exe'
Product: rcedit
Stage 2: all of selection_flags
CommandLine|contains: --set-
Stage 3: all of selection_attributes
or:
CommandLine|contains: CompanyName
CommandLine|contains: FileDescription
CommandLine|contains: LegalCopyright
CommandLine|contains: OriginalFileName
CommandLine|contains: ProductName
CommandLine|contains: ProductVersion
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
Description | eq |
|
Image | ends_with |
|
Product | eq |
|