Windows Binaries Lolbins Renamed

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query detects the execution of renamed Windows binaries (Lolbins). This is a common technique used by adversaries to evade detection. Ref: https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/execution-of-renamed-lolbin.html

Attribute Value
Type Analytic Rule
Solution Endpoint Threat Protection Essentials
ID cbf6ad48-fa5c-4bf7-b205-28dbadb91255
Severity Medium
Status Available
Kind Scheduled
Tactics Execution
Techniques T1059
Required Connectors SecurityEvents, WindowsSecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event EventID == "1"
EventLog == "Microsoft-Windows-Sysmon/Operational"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Endpoint Threat Protection Essentials