EXPLORE
← Back to Explore
sigmahighHunting

Execution Of Non-Existing File

Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)

Detection Query

image_absolute_path:
  Image|contains: \
filter_null:
  Image: null
filter_empty:
  Image:
    - "-"
    - ""
filter_4688:
  - Image:
      - System
      - Registry
      - MemCompression
      - vmmem
  - CommandLine:
      - Registry
      - MemCompression
      - vmmem
condition: not image_absolute_path and not 1 of filter*

Author

Max Altgelt (Nextron Systems)

Created

2021-12-09

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.defense-evasion
Raw Content
title: Execution Of Non-Existing File
id: 71158e3f-df67-472b-930e-7d287acaa3e1
status: test
description: Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)
references:
    - https://pentestlaboratories.com/2021/12/08/process-ghosting/
author: Max Altgelt (Nextron Systems)
date: 2021-12-09
modified: 2022-12-14
tags:
    - attack.defense-evasion
logsource:
    category: process_creation
    product: windows
detection:
    image_absolute_path:
        Image|contains: '\'
    filter_null:
        Image: null
    filter_empty:
        Image:
            - '-'
            - ''
    filter_4688:
        - Image:
              - 'System'
              - 'Registry'
              - 'MemCompression'
              - 'vmmem'
        - CommandLine:
              - 'Registry'
              - 'MemCompression'
              - 'vmmem'
    condition: not image_absolute_path and not 1 of filter*
falsepositives:
    - Unknown
level: high