
Summary
The detection rule identifies potentially malicious file creation activities in the Windows Startup folder, which could signify attempts at lateral movement by adversaries through the Remote Desktop Protocol (RDP) or SMB access. This rule utilizes EQL (Event Query Language) to look for file creation events associated with specific process identifiers, particularly monitoring instances where 'mstsc.exe' (the RDP client) is running or when the process ID indicates a system-level access (PID 4). If an unauthorized file is detected in the Startup folder, it may suggest an attempt to establish persistence on the system, allowing a malicious actor to execute their payload after a system reboot or user login. The rule consolidates data from various log sources such as Endpoint logs, Winlogbeat, Sysmon operations, and Microsoft 365 Defender, ensuring comprehensive coverage for detecting suspicious modifications within critical system directories.
Categories
- Endpoint
- Windows
- Cloud
- Infrastructure
Data Sources
- File
- Process
- Windows Registry
- Application Log
- Network Traffic
ATT&CK Techniques
- T1021
- T1021.001
- T1547
- T1547.001
Created: 2020-10-19