Detectionhightest

Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location

Detects the use of iexpress.exe to create binaries via Self Extraction Directive (SED) files located in potentially suspicious locations. This behavior has been observed in-the-wild by different threat actors.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Joseliyo Sanchez, Nasreddine Bencherchali (Nextron Systems)Created Mon Feb 05Updated Tue Jun 04b2b048b0-7857-4380-b0fb-d3f0ab820b71windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic3 selectors
detection:
    # VT Query: behavior_processes:"iexpress.exe" and behavior_processes:"/n /q /m" and behavior_processes:"*.sed*" and p:5+
    selection_img:
        - Image|endswith: '\iexpress.exe'
        - OriginalFileName: 'IEXPRESS.exe'
    selection_cli:
        CommandLine|contains|windash: ' /n '
    selection_paths:
        CommandLine|contains:
            # Note: Add more uncommon paths that fit your organizational needs.
            - ':\ProgramData\'
            - ':\Temp\'
            - ':\Windows\System32\Tasks\'
            - ':\Windows\Tasks\'
            - ':\Windows\Temp\'
            - '\AppData\Local\Temp\'
    condition: all of selection_*
False Positives

Administrators building packages using iexpress.exe

Rule Metadata
Rule ID
b2b048b0-7857-4380-b0fb-d3f0ab820b71
Status
test
Level
high
Type
Detection
Created
Mon Feb 05
Modified
Tue Jun 04
Path
rules/windows/process_creation/proc_creation_win_iexpress_susp_execution.yml
Raw Tags
attack.defense-evasionattack.t1218
View on GitHub