Defense Evasion (TA0005)(external, opens in a new tab or window)
Persistence (TA0003)(external, opens in a new tab or window)
endpoint(external, opens in a new tab or window)
sentinel_one_cloud_funnel(external, opens in a new tab or window)
text code block:process where host.os.type == "windows" and event.type == "start" and not process.code_signature.status like "errorCode_endpoint*" and process.hash.sha256 != null and ( /* Slack */ (process.name : "slack.exe" and not (process.code_signature.subject_name : ( "Slack Technologies, Inc.", "Slack Technologies, LLC" ) and process.code_signature.trusted == true) ) or /* WebEx */ (process.name : "WebexHost.exe" and not (process.code_signature.subject_name : ("Cisco WebEx LLC", "Cisco Systems, Inc.") and process.code_signature.trusted == true) ) or /* Teams */ (process.name : "Teams.exe" and not (process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true) and process.executable != "C:\\Program Files (x86)\\Teams Installer\\Teams.exe" ) or /* Discord */ (process.name : "Discord.exe" and not (process.code_signature.subject_name : "Discord Inc." and process.code_signature.trusted == true) ) or /* RocketChat */ (process.name : "Rocket.Chat.exe" and not (process.code_signature.subject_name : "Rocket.Chat Technologies Corp." and process.code_signature.trusted == true) and process.executable != "C:\\Program Files\\rocketchat\\Rocket.Chat.exe" ) or /* Mattermost */ (process.name : "Mattermost.exe" and not (process.code_signature.subject_name : "Mattermost, Inc." and process.code_signature.trusted == true) ) or /* WhatsApp */ (process.name : "WhatsApp.exe" and not (process.code_signature.subject_name : ( "WhatsApp LLC", "WhatsApp, Inc", "24803D75-212C-471A-BC57-9EF86AB91435" ) and process.code_signature.trusted == true) ) or /* Zoom */ (process.name : "Zoom.exe" and not (process.code_signature.subject_name : ( "Zoom Video Communications, Inc.", "Zoom Communications, Inc." ) and process.code_signature.trusted == true) ) or /* Outlook */ (process.name : "outlook.exe" and not (process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true) ) or /* Thunderbird */ (process.name : "thunderbird.exe" and not (process.code_signature.subject_name : "Mozilla Corporation" and process.code_signature.trusted == true) ) )
Install detection rules in Elastic Security
Detect Potential Masquerading as Communication Apps in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).