
Summary
This detection rule is designed to identify suspicious behavior associated with the WinRAR application on Windows systems, specifically when it creates files in startup locations, such as the Startup folder. This activity may signify an attempt to establish persistence by executing potentially malicious files upon system startup. The rule is particularly relevant in the context of known exploits of WinRAR that leverage vulnerabilities like CVE-2025-6218 and CVE-2025-8088. When WinRAR is used to drop files directly in the startup directories, it could indicate that an attacker is trying to maintain access to the system after a reboot, thus making this behavior a noteworthy indicator of compromise. The detection looks for specific file creation events where the executing image ends with 'WinRAR.exe' or 'Rar.exe' and the target filename contains the phrase '\Start Menu\Programs\Startup\'. It helps security teams monitor for unauthorized persistence mechanisms being introduced through this widely-used archive management tool, especially in enterprise environments where such tactics could lead to serious security incidents.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2025-07-16