
Summary
This detection rule aims to identify suspicious file creation in the Windows startup directory, which may indicate a persistence mechanism being established by malware or unauthorized applications. The startup folder is a common location for malicious actors to place their payloads for automatic execution upon system boot. The rule looks for file writes specifically targeting the Windows startup path, monitoring the 'TargetFilename' for any entries containing '\Microsoft\Windows\Start Menu\Programs\StartUp'. To reduce false positives, the rule filters out processes known to be legitimate and expected to interact with this directory, such as 'C:\Windows\System32\wuauclt.exe' and any file paths that start with 'C:\$WINDOWS.~BT\NewOS\'. The overall approach is focused on monitoring and alerting on potentially malicious behavior while minimizing alerts from non-threatening sources.
Categories
- Windows
- Endpoint
- On-Premise
Data Sources
- File
- Process
Created: 2020-05-02