← Back to Explore
sigmahighHunting
Renamed SysInternals DebugView Execution
Detects suspicious renamed SysInternals DebugView execution
Detection Query
selection:
Product: Sysinternals DebugView
filter:
OriginalFileName: Dbgview.exe
Image|endswith: \Dbgview.exe
condition: selection and not filter
Author
Florian Roth (Nextron Systems)
Created
2020-05-28
Data Sources
windowsProcess Creation Events
Platforms
windows
Tags
attack.resource-developmentattack.t1588.002
Raw Content
title: Renamed SysInternals DebugView Execution
id: cd764533-2e07-40d6-a718-cfeec7f2da7f
status: test
description: Detects suspicious renamed SysInternals DebugView execution
references:
- https://www.epicturla.com/blog/sysinturla
author: Florian Roth (Nextron Systems)
date: 2020-05-28
modified: 2023-02-14
tags:
- attack.resource-development
- attack.t1588.002
logsource:
category: process_creation
product: windows
detection:
selection:
Product: 'Sysinternals DebugView'
filter:
OriginalFileName: 'Dbgview.exe'
Image|endswith: '\Dbgview.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high