Detection rules › Sigma
Potential Binary Impersonating Sysinternals Tools
Detects binaries that use the same name as legitimate sysinternals tools to evade detection. This rule looks for the execution of binaries that are named similarly to Sysinternals tools. Adversary may rename their malicious tools as legitimate Sysinternals tools to evade detection.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1036.005 Masquerading: Match Legitimate Resource Name or Location, T1202 Indirect Command Execution, T1218 System Binary Proxy Execution |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: 1 of selection_exe
or:
Image|endswith: '\ADExplorer.exe'
Image|endswith: '\ADExplorer64.exe'
Image|endswith: '\ADInsight.exe'
Image|endswith: '\ADInsight64.exe'
Image|endswith: '\AccessEnum.exe'
Image|endswith: '\Autologon.exe'
Image|endswith: '\Autologon64.exe'
Image|endswith: '\Autoruns.exe'
Image|endswith: '\Autoruns64.exe'
Image|endswith: '\Bginfo.exe'
Image|endswith: '\Bginfo64.exe'
Image|endswith: '\CPUSTRES.EXE'
Image|endswith: '\CPUSTRES64.EXE'
Image|endswith: '\Cacheset.exe'
Image|endswith: '\Cacheset64.exe'
Image|endswith: '\Clockres.exe'
Image|endswith: '\Clockres64.exe'
Image|endswith: '\Contig.exe'
Image|endswith: '\Contig64.exe'
Image|endswith: '\Coreinfo.exe'
Image|endswith: '\Coreinfo64.exe'
Image|endswith: '\Dbgview.exe'
Image|endswith: '\Desktops.exe'
Image|endswith: '\Desktops64.exe'
Image|endswith: '\DiskView.exe'
Image|endswith: '\DiskView64.exe'
Image|endswith: '\Diskmon.exe'
Image|endswith: '\Diskmon64.exe'
Image|endswith: '\FindLinks.exe'
Image|endswith: '\FindLinks64.exe'
Image|endswith: '\Procmon.exe'
Image|endswith: '\Procmon64.exe'
Image|endswith: '\RAMMap.exe'
Image|endswith: '\RAMMap64.exe'
Image|endswith: '\RDCMan.exe'
Image|endswith: '\RegDelNull.exe'
Image|endswith: '\RegDelNull64.exe'
Image|endswith: '\ShareEnum.exe'
Image|endswith: '\ShareEnum64.exe'
Image|endswith: '\Sysmon.exe'
Image|endswith: '\Sysmon64.exe'
Image|endswith: '\Testlimit.exe'
Image|endswith: '\Testlimit64.exe'
Image|endswith: '\Volumeid.exe'
Image|endswith: '\Volumeid64.exe'
Image|endswith: '\Winobj.exe'
Image|endswith: '\Winobj64.exe'
Image|endswith: '\ZoomIt.exe'
Image|endswith: '\ZoomIt64.exe'
Image|endswith: '\accesschk.exe'
Image|endswith: '\accesschk64.exe'
Image|endswith: '\adrestore.exe'
Image|endswith: '\adrestore64.exe'
Image|endswith: '\autorunsc.exe'
Image|endswith: '\autorunsc64.exe'
Image|endswith: '\ctrl2cap.exe'
Image|endswith: '\dbgview64.exe'
Image|endswith: '\disk2vhd.exe'
Image|endswith: '\disk2vhd64.exe'
Image|endswith: '\diskext.exe'
Image|endswith: '\diskext64.exe'
Image|endswith: '\du.exe'
Image|endswith: '\du64.exe'
Image|endswith: '\efsdump.exe'
Image|endswith: '\handle.exe'
Image|endswith: '\handle64.exe'
Image|endswith: '\hex2dec.exe'
Image|endswith: '\hex2dec64.exe'
Image|endswith: '\junction.exe'
Image|endswith: '\junction64.exe'
Image|endswith: '\ldmdump.exe'
Image|endswith: '\listdlls.exe'
Image|endswith: '\listdlls64.exe'
Image|endswith: '\livekd.exe'
Image|endswith: '\livekd64.exe'
Image|endswith: '\loadOrd.exe'
Image|endswith: '\loadOrd64.exe'
Image|endswith: '\loadOrdC.exe'
Image|endswith: '\loadOrdC64.exe'
Image|endswith: '\logonsessions.exe'
Image|endswith: '\logonsessions64.exe'
Image|endswith: '\movefile.exe'
Image|endswith: '\movefile64.exe'
Image|endswith: '\notmyfault.exe'
Image|endswith: '\notmyfault64.exe'
Image|endswith: '\notmyfaultc.exe'
Image|endswith: '\notmyfaultc64.exe'
Image|endswith: '\ntfsinfo.exe'
Image|endswith: '\ntfsinfo64.exe'
Image|endswith: '\pendmoves.exe'
Image|endswith: '\pendmoves64.exe'
Image|endswith: '\pipelist.exe'
Image|endswith: '\pipelist64.exe'
Image|endswith: '\portmon.exe'
Image|endswith: '\procdump.exe'
Image|endswith: '\procdump64.exe'
Image|endswith: '\procexp.exe'
Image|endswith: '\procexp64.exe'
Image|endswith: '\psExec.exe'
Image|endswith: '\psExec64.exe'
Image|endswith: '\psGetsid.exe'
Image|endswith: '\psGetsid64.exe'
Image|endswith: '\psInfo.exe'
Image|endswith: '\psInfo64.exe'
Image|endswith: '\psLoggedon.exe'
Image|endswith: '\psLoggedon64.exe'
Image|endswith: '\psService.exe'
Image|endswith: '\psService64.exe'
Image|endswith: '\psfile.exe'
Image|endswith: '\psfile64.exe'
Image|endswith: '\pskill.exe'
Image|endswith: '\pskill64.exe'
Image|endswith: '\pslist.exe'
Image|endswith: '\pslist64.exe'
Image|endswith: '\psloglist.exe'
Image|endswith: '\psloglist64.exe'
Image|endswith: '\pspasswd.exe'
Image|endswith: '\pspasswd64.exe'
Image|endswith: '\psping.exe'
Image|endswith: '\psping64.exe'
Image|endswith: '\psshutdown.exe'
Image|endswith: '\psshutdown64.exe'
Image|endswith: '\pssuspend.exe'
Image|endswith: '\pssuspend64.exe'
Image|endswith: '\regjump.exe'
Image|endswith: '\ru.exe'
Image|endswith: '\ru64.exe'
Image|endswith: '\sdelete.exe'
Image|endswith: '\sdelete64.exe'
Image|endswith: '\shellRunas.exe'
Image|endswith: '\sigcheck.exe'
Image|endswith: '\sigcheck64.exe'
Image|endswith: '\streams.exe'
Image|endswith: '\streams64.exe'
Image|endswith: '\strings.exe'
Image|endswith: '\strings64.exe'
Image|endswith: '\sync.exe'
Image|endswith: '\sync64.exe'
Image|endswith: '\tcpvcon.exe'
Image|endswith: '\tcpvcon64.exe'
Image|endswith: '\tcpview.exe'
Image|endswith: '\tcpview64.exe'
Image|endswith: '\vmmap.exe'
Image|endswith: '\vmmap64.exe'
Image|endswith: '\whois.exe'
Image|endswith: '\whois64.exe'
Stage 2: 1 of selection_arm64
or:
Image|endswith: '\ADExplorer64a.exe'
Image|endswith: '\ADInsight64a.exe'
Image|endswith: '\Autologon64a.exe'
Image|endswith: '\Autoruns64a.exe'
Image|endswith: '\Clockres64a.exe'
Image|endswith: '\Contig64a.exe'
Image|endswith: '\Coreinfo64a.exe'
Image|endswith: '\Dbgview64a.exe'
Image|endswith: '\DiskView64a.exe'
Image|endswith: '\FindLinks64a.exe'
Image|endswith: '\LoadOrd64a.exe'
Image|endswith: '\LoadOrdC64a.exe'
Image|endswith: '\Procmon64a.exe'
Image|endswith: '\PsExec64a.exe'
Image|endswith: '\PsGetsid64a.exe'
Image|endswith: '\PsInfo64a.exe'
Image|endswith: '\PsService64a.exe'
Image|endswith: '\RAMMap64a.exe'
Image|endswith: '\RegDelNull64a.exe'
Image|endswith: '\Sysmon64a.exe'
Image|endswith: '\Winobj64a.exe'
Image|endswith: '\ZoomIt64a.exe'
Image|endswith: '\accesschk64a.exe'
Image|endswith: '\adrestore64a.exe'
Image|endswith: '\autorunsc64a.exe'
Image|endswith: '\disk2vhd64a.exe'
Image|endswith: '\diskext64a.exe'
Image|endswith: '\du64a.exe'
Image|endswith: '\handle64a.exe'
Image|endswith: '\hex2dec64a.exe'
Image|endswith: '\junction64a.exe'
Image|endswith: '\logonsessions64a.exe'
Image|endswith: '\movefile64a.exe'
Image|endswith: '\notmyfault64a.exe'
Image|endswith: '\notmyfaultc64a.exe'
Image|endswith: '\pendmoves64a.exe'
Image|endswith: '\pipelist64a.exe'
Image|endswith: '\procdump64a.exe'
Image|endswith: '\procexp64a.exe'
Image|endswith: '\psfile64a.exe'
Image|endswith: '\pskill64a.exe'
Image|endswith: '\psloglist64a.exe'
Image|endswith: '\pspasswd64a.exe'
Image|endswith: '\psping64a.exe'
Image|endswith: '\pssuspend64a.exe'
Image|endswith: '\ru64a.exe'
Image|endswith: '\sdelete64a.exe'
Image|endswith: '\sigcheck64a.exe'
Image|endswith: '\streams64a.exe'
Image|endswith: '\strings64a.exe'
Image|endswith: '\sync64a.exe'
Image|endswith: '\tcpvcon64a.exe'
Image|endswith: '\tcpview64a.exe'
Image|endswith: '\vmmap64a.exe'
Image|endswith: '\whois64a.exe'
Stage 3: not 1 of filter_*
or:
Company: 'Sysinternals - www.sysinternals.com'
Company: Sysinternals
Company: null
Product: null
Product|startswith: Sysinternals
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Company | eq |
|
Image | ends_with |
|
Product | starts_with |
|