Suspicious Double Extension File Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects suspicious use of an .exe extension after a non-executable file extension like .pdf.exe, a set of spaces or underlines to cloak the executable file in spear phishing campaigns

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith " .exe,______.exe,.doc.exe,.doc.js,.docx.exe,.docx.js,.gif.exe,.jpeg.exe,.jpg.exe,.mkv.exe,.mov.exe,.mp3.exe,.mp4.exe,.pdf.exe,.pdf.js" OR PROCESSNAME endswith ".png.exe,.ppt.exe,.ppt.js,.pptx.exe,.pptx.js,.rtf.exe,.rtf.js,.svg.exe,.txt.exe,.txt.js,.xls.exe,.xls.js,.xlsx.exe,.xlsx.js,⠀⠀⠀⠀⠀⠀.exe") AND (COMMANDLINE contains " .exe,______.exe,.doc.exe,.doc.js,.docx.exe,.docx.js,.gif.exe,.jpeg.exe,.jpg.exe,.mkv.exe,.mov.exe,.mp3.exe,.mp4.exe,.pdf.exe,.pdf.js" OR COMMANDLINE contains ".png.exe,.ppt.exe,.ppt.js,.pptx.exe,.pptx.js,.rtf.exe,.rtf.js,.svg.exe,.txt.exe,.txt.js,.xls.exe,.xls.js,.xlsx.exe,.xlsx.js,⠀⠀⠀⠀⠀⠀.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems)