Does CBC have a way to detect path masquerading via query searching the console?
Yes, the CBC can detect path masquerading because it doesn't do any path simplification (e.g. translate these unicode spaces into just spaces) other than converting to lowercase, but it is dependent on configuring detection rules and what endpoint telemetry is collected.
CBC can assist with both process hashing and path mismatch because it tracks process hashes alongside their file paths. If a legitimate system binary (e.g., C:\Windows\System32\notepad.exe) is actually executing from an unexpected location (e.g., C:\Users\Public\notepad.exe), CB Cloud can flag it as suspicious because the hash does not match the expected version.
Example: process_name:svchost.exe AND -process_path:C:\Windows\System32\
SELECT path, checksum FROM processes WHERE path NOT LIKE 'C:\Windows\System32\%';
CBC can also prevent execution of renamed system binaries using custom policies. Reputation rules can also be used as if an attacker renames a system binary, the reputation score of the file may drop or change from trusted_white, helping flag it.