heroui logo

Windows Process Execution in Temp Dir

Splunk Security Content

View Source
Summary
This analytic detection rule identifies processes that are executed from the temporary directory (%temp%) on Windows systems. It leverages insights from various data sources including Sysmon and Windows Event Logs to focus on process activities occurring within unusual or non-standard directories. Often, adversaries utilize these paths to execute malicious software without requiring elevated permissions. This behavior, if confirmed as malicious, could indicate attempts at bypassing security measures and may lead to unauthorized execution of programs, potentially compromising the system and facilitating further malicious endeavors. The rule helps organizations detect anomalous activity and provide visibility into potentially harmful behaviors that arise from processes executing from these temporary locations.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1543
  • T1036
  • T1036.005
Created: 2025-01-27