<<< Hide Navigation Hide TOC >>>
Potential Defense Evasion Via Rename Of Highly Relevant Binaries (0ba1da6d-b6ce-4366-828c-18826c9de23e)
Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Rename System Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) | Attack Pattern | Potential Defense Evasion Via Rename Of Highly Relevant Binaries (0ba1da6d-b6ce-4366-828c-18826c9de23e) | Sigma-Rules | 1 |
Rename System Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) | Attack Pattern | Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) | Attack Pattern | 2 |