Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMRenamedWindowsBinary.yaml (23 lines of code) (raw):

id: 9281b7cc-8f05-45a9-bf10-17fb29492a84 name: CyberArkEPM - Renamed Windows binary description: | 'Detects renamed windows binaries.' severity: High requiredDataConnectors: - connectorId: CyberArkEPM dataTypes: - CyberArkEPM queryFrequency: 1h queryPeriod: 1h triggerOperator: gt triggerThreshold: 0 tactics: - Execution - DefenseEvasion relevantTechniques: - T1204 - T1036 query: | CyberArkEPM | where EventSubType != 'AttackAttempt' | where ActingProcessName has @'\' | where ActingProcessName !has ActingProcessFileInternalName | project EventEndTime, EventMessage, ActorUsername, ActingProcessFileInternalName | extend AccountCustomEntity = ActorUsername entityMappings: - entityType: Account fieldMappings: - identifier: Name columnName: AccountCustomEntity version: 1.0.0 kind: Scheduled