
Summary
This rule aims to detect potential malicious activity involving the use of the SoundRecorder application on Windows systems. Attackers may attempt to gather audio data stealthily, potentially compromising sensitive information. The rule specifically captures events where the SoundRecorder executable (SoundRecorder.exe) is launched with a command-line argument that includes '/FILE', indicating that an audio file is being created or recorded. The detection is based on process creation logs, which are a crucial source of information in identifying unauthorized applications running on a system. Users of this rule should be aware of the potential for false positives, especially concerning legitimate audio recording activities by authorized users.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1123
Created: 2019-10-24