Sysmon Event ID 29

SourceSysmon

29: File Executable Detected

This is an event from Sysmon.

On this page

This is a valuable event for detecting the appearance of new EXEs and DLLs on your network.  Sysmon monitors the creation of new files and once they are closed it examines the beginning of the file to see if it matches the PE header file format.  If so, Sysmon logs this event identifying the user and program that created the new PE file.

If you'd like Sysmon to actually delete new PE files when they appear in certain folders or according to other criteria see Event ID 27.

Free Security Log Resources by Randy

Description Fields in 29

  • Log Name
  • Source
  • Date
  • Event ID
  • Task Category
  • Level
  • Keywords
  • User
  • Computer
  • Description
  • RuleName
  • UtcTime
  • ProcessGuid
  • ProcessId
  • User
  • Image
  • TargetFilename
  • Hashes

Supercharger Free Edition


Supercharger's built-in Xpath filters leave the noise behind.

Free.

 

Examples of 29

Log Name:       Microsoft-Windows-Sysmon/Operational
Source:         Microsoft-Windows-Sysmon
Date:           4/15/2024  8:57:35 PM
Event ID:       29
Task Category: File Executable Detected (rule: FileExecutableDetected)
Level:          Information
Keywords:      
User:           SYSTEM
Computer:       dc1.Win2022.local
Description: File Executable Detected:
RuleName: -
UtcTime: 2024-04-16 03:57:35.123
ProcessGuid: {8a1a452d-2087-65de-9204-000000000500}
ProcessId: 21400
User: win2022\administrator
Image: C:\Windows\Explorer.EXE
TargetFilename: C:\Users\bosshogg\AppData\Roaming\Microsoft\Windows\Recent\logs.lnk
Hashes: SHA1=BA90632BB2CE42BB40C93CD0B2A88E1FE7E0787E,MD5=9473398C90A26774335A3F8235A5ADC6,SHA256=D876955B30350ED09A90E37713A71E649667952C318B9C6879E855CC07B39430,IMPHASH=00000000000000000000000000000000

Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
    <EventID>29</EventID>
    <Version>5</Version>
    <Level>4</Level>
    <Task>29</Task>
    <Opcode>0</Opcode>
    <Keywords>0x8000000000000000</Keywords>
    <TimeCreated SystemTime="2024-02-27T17:48:55.9824794Z" />
    <EventRecordID>756</EventRecordID>
    <Correlation />
    <Execution ProcessID="22948" ThreadID="18572" />
    <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
    <Computer>dc1.Win2022.local</Computer>
    <Security UserID="S-1-5-18" />
  </System>
<EventData>
  <Data Name="RuleName">-</Data>
  <Data Name="UtcTime">2024-02-27 17:48:55.967</Data>
  <Data Name="ProcessGuid">{8a1a452d-2087-65de-9204-000000000500}</Data>
  <Data Name="ProcessId">21400</Data>
  <Data Name="User">win2022\administrator</Data>
  <Data Name="Image">C:\Windows\Explorer.EXE</Data>
  <Data Name="TargetFilename">C:\Users\bosshogg\AppData\Roaming\Microsoft\Windows\Recent\logs.lnk</Data>
  <Data Name="Hashes">SHA1=BA90632BB2CE42BB40C93CD0B2A88E1FE7E0787E,MD5=9473398C90A26774335A3F8235A5ADC6,SHA256=D876955B30350ED09A90E37713A71E649667952C318B9C6879E855CC07B39430,IMPHASH=00000000000000000000000000000000</Data>
</EventData>
</Event>

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection



 

Additional Resources

    Go To Event ID:

    Security Log
    Quick Reference
    Chart
    Download now!