
Summary
This rule monitors the execution of the 'findstr.exe' or 'find.exe' commands to detect attempts by threat actors to discover security software on systems, allowing them to evade detection mechanisms. By tracking specific patterns in command execution, including calls to common security applications such as Avira, Kaspersky, and others, organizations can be alerted to potential reconnaissance efforts by attackers. The logic triggers on Windows Sysmon events, specifically EventCode=1, indicating process creation. The detection logic includes a regex match to identify the specific paths and processes involved, capturing pertinent information such as timestamp, host, user, and process details. This rule is crucial in fortifying defenses against pre-attack reconnaissance that targets security systems.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1518.001
- T1518
Created: 2025-03-28