← Back to Explore
sigmamediumHunting
Process Launched Without Image Name
Detect the use of processes with no name (".exe"), which can be used to evade Image-based detections.
Detection Query
selection:
Image|endswith: \.exe
condition: selection
Author
Matt Anderson (Huntress)
Created
2024-07-23
Data Sources
windowsProcess Creation Events
Platforms
windows
References
Tags
attack.defense-evasion
Raw Content
title: Process Launched Without Image Name
id: f208d6d8-d83a-4c2c-960d-877c37da84e5
status: test
description: Detect the use of processes with no name (".exe"), which can be used to evade Image-based detections.
references:
- https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software
author: Matt Anderson (Huntress)
date: 2024-07-23
tags:
- attack.defense-evasion
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\.exe'
condition: selection
falsepositives:
- Rare legitimate software.
level: medium