Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMUnexpectedExecutableExtension.yaml (24 lines of code) (raw):

id: 911d5b75-a1ce-4f13-a839-9c2474768696 name: CyberArkEPM - Unexpected executable extension description: | 'Detects Windows executable with unexpected extension.' severity: Medium requiredDataConnectors: - connectorId: CyberArkEPM dataTypes: - CyberArkEPM queryFrequency: 30m queryPeriod: 30m triggerOperator: gt triggerThreshold: 0 tactics: - Execution - DefenseEvasion relevantTechniques: - T1204 - T1036 query: | CyberArkEPM | where EventSubType != 'AttackAttempt' | where ActingProcessName has @'\' | where ActingProcessName !endswith '.exe' | project EventEndTime, EventMessage, ActorUsername, ActingProcessFileInternalName | extend AccountCustomEntity = ActorUsername entityMappings: - entityType: Account fieldMappings: - identifier: Name columnName: AccountCustomEntity version: 1.0.0 kind: Scheduled