Skip to content
Threat Feed
medium advisory

Renamed Utility Executed with Short Program Name

This rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.

This detection identifies the execution of a process with a single-character process name that differs from the original file name. Adversaries often employ this technique during staging, to execute temporary utilities, or to bypass security detections relying on process names. This behavior is typically observed in Windows environments where attackers attempt to masquerade their activities by renaming legitimate utilities to short, less conspicuous names, making it harder to identify malicious processes based on their name alone. The detection leverages process creation events from Elastic Defend, Microsoft Defender XDR, Crowdstrike, and Sysmon to identify such anomalies. The rule was initially created on 2020-11-15 and last updated on 2026-05-04.

Attack Chain

  1. An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of vulnerabilities).
  2. The attacker renames a legitimate utility (e.g., cmd.exe, powershell.exe) to a single-character name such as a.exe.
  3. The renamed utility a.exe is executed, potentially without parameters initially, to test execution.
  4. The attacker uses the renamed utility a.exe to execute commands, download additional payloads, or perform reconnaissance.
  5. The commands executed by a.exe might involve further obfuscation techniques to evade detection, such as base64 encoding or encryption.
  6. The attacker leverages the renamed utility to establish persistence by creating scheduled tasks or modifying registry keys.
  7. The attacker moves laterally within the network, using the compromised host as a staging point.
  8. The attacker achieves their final objective, such as data exfiltration or ransomware deployment.

Impact

A successful attack using this technique can lead to significant compromise of the target system. By renaming legitimate utilities, attackers can bypass standard security measures that rely on process names for detection. This can result in delayed detection, allowing the attacker to perform further malicious activities such as data theft, installation of malware, or lateral movement within the network. While specific numbers are unavailable, this technique has been observed across various organizations, making it a relevant threat for defenders.

Recommendation

  • Enable process creation logging via Sysmon or Elastic Defend to provide the necessary data for detection.
  • Deploy the Sigma rule “Suspicious Renamed Utility Execution” to your SIEM and tune it based on your environment.
  • Investigate any alerts generated by the Sigma rule by examining the parent process and command-line arguments.
  • Review the osquery queries in the brief for additional context gathering during incident response.

Detection coverage 2

Suspicious Renamed Utility Execution

medium

Detects the execution of a process with a single-character process name, indicating potential masquerading.

sigma tactics: defense_evasion techniques: T1036, T1036.003 sources: process_creation, windows

Suspicious Short Program Name Execution (Generic)

low

Detects execution of any process with a short program name.

sigma tactics: defense_evasion techniques: T1036 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →