heroui logo

Suspicious Creation TXT File in User Desktop

Sigma Rules

View Source
Summary
This detection rule identifies the creation of suspicious text files on a user's Desktop, which is a common behavior exhibited by ransomware and other malicious activities. The specific focus is on instances where a command-line process (cmd.exe) creates a text file whose name contains a pattern typical of ransomware notes. The detection works by monitoring file events on Windows systems, particularly looking for files that are saved in the Desktop directory with a .txt extension. This behavior is indicative of possible ransom note delivery, where the ransomware notifies the victim about the encryption of their files. The rule includes a reference to relevant atomic tests that provide additional context for similar malicious behaviors.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
ATT&CK Techniques
  • T1486
Created: 2021-12-26