
Summary
This detection rule targets the execution of files originating from the INetCache directory of the Windows operating system. Adversaries often utilize this directory to temporarily store downloaded files, potentially including malicious tools or executables dropped via command and control channels. The rule identifies file executions where files were run from the path 'C:\Users\<user>\AppData\Local\Microsoft\Windows\INetCache\IE'. By monitoring the Windows Sysmon event where an executable is run, it aggregates relevant data such as timestamp, host, user, and process details, providing insights into possible lateral tool transfers or unauthorized file executions in a compromised environment. This reflects standard tactics used by adversaries to maintain persistence or deploy further attacks.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1105
Created: 2024-02-09