heroui logo

Suspicious Process Execution From Fake Recycle.Bin Folder

Sigma Rules

View Source
Summary
This detection rule aims to identify suspicious process executions that originate from a fake Recycle Bin folder, specifically targeting paths that include 'RECYCLERS.BIN\' or 'RECYCLER.BIN\'. Such tactics are commonly employed by malicious actors to bypass security measures by mimicking legitimate system folders. This rule focuses on process creation events within the Windows environment and uses specific string matching techniques to detect anomalies in execution paths. Given the potential for this type of evasion technique to indicate a compromised system, the false positive rate is deemed unlikely, supporting the high level of confidence in this detection. The rule references known phishing techniques and USB exploits that leverage similar deceptive folder names, thus providing context for its relevance and urgency.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2023-07-12