Wes Lambert Profile picture
Lead Engineer, NSM @Target Github: https://t.co/tmQk6TbWMr https://t.co/5KDnHsdBlV Mastodon: @weslambert@infosec.exchange

Oct 5, 2022, 6 tweets

🦖Day 14 of the @velocidex #velociraptor #ArtifactsOfAutumn series

Artifact: 'Windows[.]Detection[.]BinaryRename'

Author: @mgreen27

Link: docs.velociraptor.app/exchange/artif…

This artifact will detect renamed binaries commonly abused by adversaries.

Renaming binaries is a defense evasion technique used to bypass brittle process name and path-based detections. It is used by many actors/groups, including from commodity malware and nation states.

Here, we can see 'cmd.exe' was renamed in an attempt to appear as a legitimate instance of 'lsass.exe':

You can try this out by following along with the Atomic Red Team test, found here:

atomicredteam.io/defense-evasio…

Also, check out this great article by Matt:

mgreen27.github.io/posts/2019/05/…

Also check out MITRE's ATT&CK page for renaming system utilities:
attack.mitre.org/techniques/T10…

That's it for now! Stay tuned to learn about more artifacts! 🦖

#DFIR
#Infosec
#T1036

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling