
Summary
This detection rule aims to identify suspicious activity associated with .NET CLR (Common Language Runtime) Usage Log files. It focuses on monitoring the creation of log files generated by clr.dll following the execution of specific processes in a user session. The log files are named after the executing process and can indicate potential misuse of .NET applications, especially in scenarios involving evasion techniques used by attackers to manipulate or avoid detection. The rule specifies a set of target filenames that are associated with common .NET CLR executables, as well as a filter to refine the detection to only those instances where 'rundll32.exe' is invoked by 'msiexec.exe' with specific command-line parameters. This approach helps reduce false positives while still providing robust detection for potential malicious activities.
Categories
- Windows
Data Sources
- File
Created: 2022-11-18