
Summary
This detection rule is designed to flag the creation of files associated with NirSoft tool bundles on Windows endpoints. NirSoft is recognized for providing portable utilities that are often misused by threat actors for malicious activities, including credential harvesting, network reconnaissance, and data exfiltration. This rule specifically monitors the creation of certain NirSoft tool bundle files, which can be a precursor to nefarious use of these utilities in compromised systems. The alerts should be examined closely, especially when the file creations occur in locations that are not typical or on systems where such utilities are deemed unnecessary. Validating each instance against legitimate administrative activities is crucial to mitigate false positives.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- File
ATT&CK Techniques
- T1588.002
Created: 2025-10-22