heroui logo

Suspicious File Created In PerfLogs

Sigma Rules

View Source
Summary
This detection rule identifies the creation of suspicious files within the 'C:\PerfLogs\' directory, which typically holds '.etl' files for performance logging in Windows environments. The rule specifically triggers when files with certain extensions, commonly associated with malware or scripts (like .bat, .dll, .exe), are created in this directory. Given the unusual nature of such file types in 'PerfLogs', this could indicate a potential compromise or malicious activity. The detection focuses on the TargetFilename path starting with 'C:\PerfLogs\' and checks for specific file extensions indicative of executable or script files. It is important to monitor these actions as they could signify an ongoing attack execution or compromise. False positives for this rule are considered unlikely due to the uncommon nature of these extensions in the specified directory, although vigilance is always recommended when dealing with security alerts.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
  • User Account
Created: 2023-05-05