heroui logo

Creation Of a Suspicious ADS File Outside a Browser Download

Sigma Rules

View Source
Summary
This rule detects the creation of a suspicious Alternate Data Stream (ADS) file that begins with a specific content pattern and is not spawned by legitimate web browsers. The rule specifically looks for ADS files associated with potentially malicious executable types (e.g., .exe, .scr, .bat, etc.) while filtering out known browser processes to minimize false positives. By leveraging the 'ZoneTransfer' attribute to determine if a file is downloaded from the web, this rule is aimed at identifying files that might be downloaded through non-standard means to evade detection. Any ADS fulfilling these criteria but not originating from a browser is flagged as a suspicious activity, thus helping in the defense against potential evasion techniques used by malware during its execution.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Process
Created: 2022-10-22