Detectionmediumtest
Portable Gpg.EXE Execution
Detects the execution of "gpg.exe" from uncommon location. Often used by ransomware and loaders to decrypt/encrypt data.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
François Hubaut, Nasreddine Bencherchali (Nextron Systems)Created Sun Aug 06Updated Fri Nov 1077df53a5-1d78-4f32-bc5a-0e7465bd8f41windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic2 selectors
detection:
selection:
- Image|endswith:
- '\gpg.exe'
- '\gpg2.exe'
- OriginalFileName: 'gpg.exe'
- Description: 'GnuPG’s OpenPGP tool'
filter_main_legit_location:
Image|contains:
- ':\Program Files (x86)\GNU\GnuPG\bin\'
- ':\Program Files (x86)\GnuPG VS-Desktop\'
- ':\Program Files (x86)\GnuPG\bin\'
- ':\Program Files (x86)\Gpg4win\bin\'
condition: selection and not 1 of filter_main_*MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
77df53a5-1d78-4f32-bc5a-0e7465bd8f41
Status
test
Level
medium
Type
Detection
Created
Sun Aug 06
Modified
Fri Nov 10
Path
rules/windows/process_creation/proc_creation_win_gpg4win_portable_execution.yml
Raw Tags
attack.impactattack.t1486