
Summary
The 'Icacls Deny Command' analytic detection rule identifies instances where an adversary manipulates file or directory security permissions using Windows command line tools like `icacls.exe`, `cacls.exe`, and `xcacls.exe` with deny arguments. This behavior is noteworthy as it indicates potential malicious activities typically associated with Advanced Persistent Threats (APTs) and coinminer activities, aimed at evading detection and restricting access to crucial files. The rule leverages telemetry from Endpoint Detection and Response (EDR) agents, focusing specifically on process names and command-line execution patterns. If such modifications are confirmed as malicious, it could indicate that an attacker is attempting to maintain persistence or obstruct incident response actions.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1222
Created: 2024-12-10