Skip to content

Hide Navigation Hide TOC

Python Image Load By Non-Python Process (cbb56d62-4060-40f7-9466-d8aaf3123f83)

Detects the image load of "Python Core" by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code. Various tools like Py2Exe, PyInstaller, and cx_Freeze are used to bundle Python code into standalone executables. Threat actors often use these tools to bundle malicious Python scripts into executables, sometimes to obfuscate the code or to bypass security measures.

Cluster A Galaxy A Cluster B Galaxy B Level
Python Image Load By Non-Python Process (cbb56d62-4060-40f7-9466-d8aaf3123f83) Sigma-Rules Software Packing - T1027.002 (deb98323-e13f-4b0c-8d94-175379069062) Attack Pattern 1
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern Software Packing - T1027.002 (deb98323-e13f-4b0c-8d94-175379069062) Attack Pattern 2