← Back to SOC feed Coverage →

Suspicious Executable File Creation

sigma HIGH SigmaHQ
T1564
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may create suspicious executable files to execute malicious code or exploit unquoted service paths. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential initial access or persistence tactics early.

Detection Rule

Sigma (Original)

title: Suspicious Executable File Creation
id: 74babdd6-a758-4549-9632-26535279e654
status: test
description: |
    Detect creation of suspicious executable file names.
    Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.
references:
    - https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
    - https://app.any.run/tasks/76c69e2d-01e8-49d9-9aea-fb7cc0c4d3ad/
author: frack113
date: 2022-09-05
modified: 2023-12-11
tags:
    - attack.defense-evasion
    - attack.t1564
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith:
            - ':\$Recycle.Bin.exe'
            - ':\Documents and Settings.exe'
            - ':\MSOCache.exe'
            - ':\PerfLogs.exe'
            - ':\Recovery.exe'
            - '.bat.exe'
            - '.sys.exe'
    condition: selection
falsepositives:
    - Unknown
level: high

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName endswith ":\\$Recycle.Bin.exe" or TargetFileName endswith ":\\Documents and Settings.exe" or TargetFileName endswith ":\\MSOCache.exe" or TargetFileName endswith ":\\PerfLogs.exe" or TargetFileName endswith ":\\Recovery.exe" or TargetFileName endswith ".bat.exe" or TargetFileName endswith ".sys.exe"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_susp_executable_creation.yml