
Summary
This detection rule aims to identify potentially malicious activity involving the use of the Windows utility 'colorcpl.exe'. The rule flags instances where 'colorcpl.exe' is executed and attempts to copy files with specific extensions (.icm, .gmmp, .cdmp, .camp) to the directory 'C:\windows\system32\spool\drivers\color\'. This behavior is significant because legitimate use of 'colorcpl.exe' typically does not involve transferring arbitrary files, particularly to system directories associated with printing drivers. Therefore, its execution in conjunction with file creation in the specified target directory may indicate an evasion tactic or malicious intent. The rule leverages file event logs from Windows to compare the executed image to 'colorcpl.exe' while ensuring the target file does not match any of the extensions in the defined filter, thus deducing potentially suspicious actions.
Categories
- Windows
- Endpoint
Data Sources
- File
- Process
Created: 2022-01-21