heroui logo

PCRE.NET Package Temp Files

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potentially malicious activities tied to the creation of temporary files by the PCRE.NET package on Windows systems. The rule specifically looks for files generated in the AppData Local Temp directory, which is a common target for malware seeking to execute with transient files. The presence of files matching a defined pattern within this directory suggests a possible execution of unsanctioned operations by an adversary attempting to exploit the capabilities of the PCRE.NET library. The rule effectively triggers alarms when files exhibiting this specific naming convention are detected, providing high confidence in signaling abnormal behavior related to process execution. Given that the rule has a high severity level, it is critical for security teams to validate these alerts closely to differentiate between legitimate and nefarious activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2020-10-29