
Summary
The detection rule titled 'Sqlite Module In Temp Folder' identifies the suspicious creation of sqlite3.dll files within the temporary folder of Windows systems. This rule utilizes Sysmon's Event Code 11, which logs file creation events, to alert on files with specific names associated with the sqlite module. The rule is particularly significant as the presence of sqlite3.dll in the temp directory is commonly associated with the IcedID malware, a known threat known to utilize this module to access and extract sensitive information such as financial data, credentials, and personal details from compromised systems. A confirmed detection may indicate an advanced data theft activity, which poses a high risk to endpoint security.
Categories
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1005
Created: 2024-11-13