Detectionhightest
Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location
Detects the use of iexpress.exe to create binaries via Self Extraction Directive (SED) files located in potentially suspicious locations. This behavior has been observed in-the-wild by different threat actors.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Joseliyo Sanchez, Nasreddine Bencherchali (Nextron Systems)Created Mon Feb 05Updated Tue Jun 04b2b048b0-7857-4380-b0fb-d3f0ab820b71windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic3 selectors
detection:
# VT Query: behavior_processes:"iexpress.exe" and behavior_processes:"/n /q /m" and behavior_processes:"*.sed*" and p:5+
selection_img:
- Image|endswith: '\iexpress.exe'
- OriginalFileName: 'IEXPRESS.exe'
selection_cli:
CommandLine|contains|windash: ' /n '
selection_paths:
CommandLine|contains:
# Note: Add more uncommon paths that fit your organizational needs.
- ':\ProgramData\'
- ':\Temp\'
- ':\Windows\System32\Tasks\'
- ':\Windows\Tasks\'
- ':\Windows\Temp\'
- '\AppData\Local\Temp\'
condition: all of selection_*False Positives
Administrators building packages using iexpress.exe
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
b2b048b0-7857-4380-b0fb-d3f0ab820b71
Status
test
Level
high
Type
Detection
Created
Mon Feb 05
Modified
Tue Jun 04
Path
rules/windows/process_creation/proc_creation_win_iexpress_susp_execution.yml
Raw Tags
attack.defense-evasionattack.t1218