EXPLORE
← Back to Explore
sigmamediumHunting

Suspicious File Characteristics Due to Missing Fields

Detects Executables in the Downloads folder without FileVersion,Description,Product,Company likely created with py2exe

MITRE ATT&CK

execution

Detection Query

selection1:
  Description: \?
  FileVersion: \?
selection2:
  Description: \?
  Product: \?
selection3:
  Description: \?
  Company: \?
folder:
  Image|contains: \Downloads\
condition: (selection1 or selection2 or selection3) and folder

Author

Markus Neis, Sander Wiebing

Created

2018-11-22

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.executionattack.t1059.006
Raw Content
title: Suspicious File Characteristics Due to Missing Fields
id: 9637e8a5-7131-4f7f-bdc7-2b05d8670c43
status: test
description: Detects Executables in the Downloads folder without FileVersion,Description,Product,Company likely created with py2exe
references:
    - https://securelist.com/muddywater/88059/
    - https://www.virustotal.com/#/file/276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb/detection
author: Markus Neis, Sander Wiebing
date: 2018-11-22
modified: 2022-10-09
tags:
    - attack.execution
    - attack.t1059.006
logsource:
    product: windows
    category: process_creation
detection:
    selection1:
        Description: '\?'
        FileVersion: '\?'
    selection2:
        Description: '\?'
        Product: '\?'
    selection3:
        Description: '\?'
        Company: '\?'
    folder:
        Image|contains: '\Downloads\'
    condition: (selection1 or selection2 or selection3) and folder
falsepositives:
    - Unknown
level: medium