
Summary
This detection rule identifies the execution of `Setup16.EXE`, a legacy installation utility, particularly when it is used alongside custom `.lst` files. Such `.lst` files can reference external programs that `Setup16.EXE` may invoke, potentially indicating malicious activity. This technique can be exploited by attackers as a part of 'living off the land' approaches, where they use existing system tools for nefarious purposes. The detection is structured to monitor process creation events on Windows systems, focusing on specific command line patterns and paths, thereby increasing visibility into uncommon usages of this utility.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2024-12-01