
Summary
This detection rule identifies the creation of suspicious text files on a user's Desktop, which is a common behavior exhibited by ransomware and other malicious activities. The specific focus is on instances where a command-line process (cmd.exe) creates a text file whose name contains a pattern typical of ransomware notes. The detection works by monitoring file events on Windows systems, particularly looking for files that are saved in the Desktop directory with a .txt extension. This behavior is indicative of possible ransom note delivery, where the ransomware notifies the victim about the encryption of their files. The rule includes a reference to relevant atomic tests that provide additional context for similar malicious behaviors.
Categories
- Endpoint
- Windows
Data Sources
- File
ATT&CK Techniques
- T1486
Created: 2021-12-26