Renamed Utility Executed with Short Program Name
This rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.
This detection identifies the execution of a process with a single-character process name that differs from the original file name. Adversaries often employ this technique during staging, to execute temporary utilities, or to bypass security detections relying on process names. This behavior is typically observed in Windows environments where attackers attempt to masquerade their activities by renaming legitimate utilities to short, less conspicuous names, making it harder to identify malicious processes based on their name alone. The detection leverages process creation events from Elastic Defend, Microsoft Defender XDR, Crowdstrike, and Sysmon to identify such anomalies. The rule was initially created on 2020-11-15 and last updated on 2026-05-04.
Attack Chain
- An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of vulnerabilities).
- The attacker renames a legitimate utility (e.g.,
cmd.exe,powershell.exe) to a single-character name such asa.exe. - The renamed utility
a.exeis executed, potentially without parameters initially, to test execution. - The attacker uses the renamed utility
a.exeto execute commands, download additional payloads, or perform reconnaissance. - The commands executed by
a.exemight involve further obfuscation techniques to evade detection, such as base64 encoding or encryption. - The attacker leverages the renamed utility to establish persistence by creating scheduled tasks or modifying registry keys.
- The attacker moves laterally within the network, using the compromised host as a staging point.
- The attacker achieves their final objective, such as data exfiltration or ransomware deployment.
Impact
A successful attack using this technique can lead to significant compromise of the target system. By renaming legitimate utilities, attackers can bypass standard security measures that rely on process names for detection. This can result in delayed detection, allowing the attacker to perform further malicious activities such as data theft, installation of malware, or lateral movement within the network. While specific numbers are unavailable, this technique has been observed across various organizations, making it a relevant threat for defenders.
Recommendation
- Enable process creation logging via Sysmon or Elastic Defend to provide the necessary data for detection.
- Deploy the Sigma rule “Suspicious Renamed Utility Execution” to your SIEM and tune it based on your environment.
- Investigate any alerts generated by the Sigma rule by examining the parent process and command-line arguments.
- Review the osquery queries in the brief for additional context gathering during incident response.
Detection coverage 2
Suspicious Renamed Utility Execution
mediumDetects the execution of a process with a single-character process name, indicating potential masquerading.
Suspicious Short Program Name Execution (Generic)
lowDetects execution of any process with a short program name.
Detection queries are kept inside the platform. Get full rules →