Skip to content

<<< Hide Navigation Hide TOC >>>

Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location (b2b048b0-7857-4380-b0fb-d3f0ab820b71)

Detects the use of iexpress.exe to create binaries via Self Extraction Directive (SED) files located in potentially suspicious locations. This behavior has been observed in-the-wild by different threat actors.

Galaxy ColorsSigma-Rule...Attack Pat...
Rows: 1
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location (b2b048b0-7857-4380-b0fb-d3f0ab820b71) Sigma-Rules System Binary Proxy Execution - T1218 (457c7820-d331-465a-915e-42f85500ccc4) Attack Pattern 1