heroui logo

Attrib.exe Metasploit File Dropper

Anvilogic Forge

View Source
Summary
The detection rule focuses on identifying the use of `attrib.exe`, a command-line utility in Windows that can manipulate file attributes. Adversaries often leverage this tool to bypass User Account Control (UAC) restrictions and to carry out actions such as hiding or showing files, which aids in evading detection. This specific rule is designed to capture instances where `attrib.exe` is used in conjunction with malicious dynamic link library (DLL) files, particularly when stemming from a Metasploit exploit, which uses the file_dropper.rb script to drop files while concealing their presence. The logic is structured for use in a Splunk environment, utilizing Sysmon event data to monitor for these potentially malicious activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • File
  • Windows Registry
ATT&CK Techniques
  • T1564
Created: 2024-02-09