
Summary
This rule is designed to detect the creation of `.diagcab` files on Windows systems, which are Cabinet files used for packaging and installing Windows components and applications. While these files can be part of legitimate software installations, their unexpected creation can also indicate potential exploitation activity, such as unauthorized installation tools being utilized by an attacker. The rule triggers on any file creation event where the filename ends with `.diagcab`. It's essential to assess the context of the file, including the filename and its storage location, to determine if the instance is benign or malicious. To reduce false positives, the common legitimate source from Microsoft is noted. Monitoring for such files can enhance security by identifying suspicious installation activity on the system.
Categories
- Windows
- Endpoint
- Cloud
- On-Premise
Data Sources
- File
Created: 2022-06-08